Juniper 2020-01-08 CVE publication, For more information see https://advisory.juniper.net

This commit is contained in:
Omar Gani 2020-01-15 09:31:53 +01:00
parent e9710cc7f1
commit 14caa1490e
No known key found for this signature in database
GPG Key ID: ABCD916B751254A7
11 changed files with 11 additions and 11 deletions

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1600",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1601",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1602",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets may take over the code execution of the JDHCPD process."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1603",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1604",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1605",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets and arbitrarily execute commands on the target device."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1606",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: Path traversal vulnerability in J-Web"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1607",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: Cross-Site Scripting (XSS) in J-Web"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1608",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service"
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1609",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device."
},
"affects": {

View File

@ -3,7 +3,7 @@
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
"ID": "CVE-2020-1611",
"STATE": "READY",
"STATE": "PUBLIC",
"TITLE": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device."
},
"affects": {