Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-3818

Опубликовано: 14 окт. 2014
Источник: nvd
CVSS2: 7.8
EPSS Низкий

Описание

Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:juniper:junos:9.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:9.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:9.4:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:9.5:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:9.6:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.3:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x48:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.2x50:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1x49:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.1x50:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2x50:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.2x52:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*

EPSS

Процентиль: 65%
0.00491
Низкий

7.8 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

github
больше 3 лет назад

Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE.

EPSS

Процентиль: 65%
0.00491
Низкий

7.8 High

CVSS2

Дефекты

CWE-119