Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-0236

Опубликовано: 22 апр. 2021
Источник: nvd
CVSS3: 6.5
CVSS2: 6.8
EPSS Низкий

Описание

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects only Multiprotocol BGP (MP-BGP) VPNv6 FlowSpec deployments. This issue affects: Juniper Networks Junos OS: 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. Juniper Networks Junos OS Evolved: All versions after 18.4R1-EVO prior to 20.3R2-EVO. This issue does not af

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:19.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*

EPSS

Процентиль: 45%
0.00222
Низкий

6.5 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-754
CWE-754

Связанные уязвимости

github
больше 3 лет назад

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects only Multiprotocol BGP (MP-BGP) VPNv6 FlowSpec deployments. This issue affects: Juniper Networks Junos OS: 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. Juniper Networks Junos OS Evolved: All versions after 18.4R1-EVO prior to 20.3R2-EVO. This issue does not...

EPSS

Процентиль: 45%
0.00222
Низкий

6.5 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-754
CWE-754