mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8bd4391a29
commit
c9e2ddadc6
62
2019/18xxx/CVE-2019-18375.json
Normal file
62
2019/18xxx/CVE-2019-18375.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18375",
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Symantec Advanced Secure Gateway (ASG) and ProxySG",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "ASG 6.7.4 prior to 6.7.4.10, ASG 7.x prior to 7.2.0.1, ProxySG 6.7.4 prior to 6.7.4.10, ProxySG 7.x prior to 7.2.0.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Session hijacking"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1752",
|
||||
"url": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1752"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18376.json
Normal file
62
2019/18xxx/CVE-2019-18376.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18376",
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Symantec Management Center (MC)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "MC prior to 2.4.1.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1751",
|
||||
"url": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1751"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A CSRF token disclosure vulnerability allows a remote attacker, with access to an authenticated Management Center (MC) user's web browser history or a network device that intercepts/logs traffic to MC, to obtain CSRF tokens and use them to perform CSRF attacks against MC."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -49,7 +49,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/patches/debian-changes-2.1.0b6+dfsg-1 or debian/patches/adds-a-makefile.patch, this can lead to data leakage, information\ndisclosure and potentially remote code execution on the web server. This issue affects all versions of eXtplorer in Ubuntu and Debian"
|
||||
"value": "Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/patches/debian-changes-2.1.0b6+dfsg-1 or debian/patches/adds-a-makefile.patch, this can lead to data leakage, information disclosure and potentially remote code execution on the web server. This issue affects all versions of eXtplorer in Ubuntu and Debian"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -87,8 +87,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.net/bugs/1822013"
|
||||
"refsource": "MISC",
|
||||
"url": "https://launchpad.net/bugs/1822013",
|
||||
"name": "https://launchpad.net/bugs/1822013"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -98,4 +99,4 @@
|
||||
],
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
@ -105,7 +105,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization.\n\nThis issue affects Juniper Networks Junos OS:\n17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on vMX;\n17.2 versions prior to 17.2R3-S3 on vMX;\n17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on vMX;\n17.4 versions prior to 17.4R2-S9, 17.4R3 on vMX;\n18.1 versions prior to 18.1R3-S9 on vMX;\n18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on vMX;\n18.2X75 versions prior to 18.2X75-D420, 18.2X75-D60 on vMX;\n18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1 on vMX;\n18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on vMX;\n19.1 versions prior to 19.1R1-S4, 19.1R2, 19.1R3 on vMX;\n19.2 versions prior to 19.2R1-S3, 19.2R2 on vMX;\n19.3 versions prior to 19.3R1-S1, 19.3R2 on vMX."
|
||||
"value": "The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization. This issue affects Juniper Networks Junos OS: 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on vMX; 17.2 versions prior to 17.2R3-S3 on vMX; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on vMX; 17.4 versions prior to 17.4R2-S9, 17.4R3 on vMX; 18.1 versions prior to 18.1R3-S9 on vMX; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on vMX; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D60 on vMX; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1 on vMX; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on vMX; 19.1 versions prior to 19.1R1-S4, 19.1R2, 19.1R3 on vMX; 19.2 versions prior to 19.2R1-S3, 19.2R2 on vMX; 19.3 versions prior to 19.3R1-S1, 19.3R2 on vMX."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log.\nThis issue affects all versions of Junos OS Evolved prior to 19.3R1."
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces.\nThis issue affects all versions of Junos OS Evolved prior to 19.3R1."
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore.\nThis issue affects all versions of Junos OS Evolved prior to 19.1R1.\n"
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file.\nThis issue affects all versions of Junos OS Evolved prior to 19.2R1."
|
||||
"value": "A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files.\nThis issue affects all versions of Junos OS Evolved prior to 19.1R1.\n"
|
||||
"value": "A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -104,7 +104,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The kernel memory usage represented as \"temp\" via 'show system virtual-memory' may constantly increase when Integrated Routing and Bridging (IRB) is configured with multiple underlay physical interfaces, and one interface flaps. This memory leak can affect running daemons (processes), leading to an extended Denial of Service (DoS) condition.\n\nUsage of \"temp\" virtual memory, shown here by a constantly increasing value of outstanding Requests, can be monitored by executing the 'show system virtual-memory' command as shown below:\n\n user@junos> show system virtual-memory |match \"fpc|type|temp\" \n fpc0:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2023 431K - 10551 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n fpc1:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2020 431K - 6460 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n \n user@junos> show system virtual-memory |match \"fpc|type|temp\" \n fpc0:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2023 431K - 16101 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n fpc1:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2020 431K - 6665 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n \n user@junos> show system virtual-memory |match \"fpc|type|temp\" \n fpc0:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2023 431K - 21867 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n fpc1:\n --------------------------------------------------------------------------\n Type InUse MemUse HighUse Requests Size(s)\n temp 2020 431K - 6858 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608\n\nThis issue affects Juniper Networks Junos OS:\n16.1 versions prior to 16.1R7-S6;\n17.1 versions prior to 17.1R2-S11, 17.1R3-S1;\n17.2 versions prior to 17.2R2-S8, 17.2R3-S3;\n17.2X75 versions prior to 17.2X75-D44;\n17.3 versions prior to 17.3R2-S5, 17.3R3-S6;\n17.4 versions prior to 17.4R2-S5, 17.4R3;\n18.1 versions prior to 18.1R3-S7;\n18.2 versions prior to 18.2R2-S5, 18.2R3;\n18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60;\n18.3 versions prior to 18.3R1-S5, 18.3R2-S3, 18.3R3;\n18.4 versions prior to 18.4R2-S2, 18.4R3;\n19.1 versions prior to 19.1R1-S3, 19.1R2;\n19.2 versions prior to 19.2R1-S3, 19.2R2.\n\nThis issue does not affect Juniper Networks Junos OS 12.3 and 15.1."
|
||||
"value": "The kernel memory usage represented as \"temp\" via 'show system virtual-memory' may constantly increase when Integrated Routing and Bridging (IRB) is configured with multiple underlay physical interfaces, and one interface flaps. This memory leak can affect running daemons (processes), leading to an extended Denial of Service (DoS) condition. Usage of \"temp\" virtual memory, shown here by a constantly increasing value of outstanding Requests, can be monitored by executing the 'show system virtual-memory' command as shown below: user@junos> show system virtual-memory |match \"fpc|type|temp\" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 10551 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6460 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 user@junos> show system virtual-memory |match \"fpc|type|temp\" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 16101 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6665 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 user@junos> show system virtual-memory |match \"fpc|type|temp\" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 21867 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6858 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D44; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60; 18.3 versions prior to 18.3R1-S5, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R2-S2, 18.4R3; 19.1 versions prior to 19.1R1-S3, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2. This issue does not affect Juniper Networks Junos OS 12.3 and 15.1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfemand process causing a sustained Denial of Service. \n\nThis issue can only be triggered by traffic sent to the device. Transit traffic does not cause this issue.\n\nThis issue affects all version of Junos OS Evolved prior to 19.1R1-EVO."
|
||||
"value": "A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfemand process causing a sustained Denial of Service. This issue can only be triggered by traffic sent to the device. Transit traffic does not cause this issue. This issue affects all version of Junos OS Evolved prior to 19.1R1-EVO."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -80,15 +80,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA11005",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/JSA11005"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.ietf.org/html/rfc6192",
|
||||
"refsource": "MISC",
|
||||
"url": "https://tools.ietf.org/html/rfc6192"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA11005",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/JSA11005"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -69,7 +69,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending the same specific packets, an attacker can repeatedly crash the riot process causing a sustained Denial of Service.\n\nFlow cache is specific to vMX based products and the MX150, and is enabled by default in performance mode.\n\nThis issue can only be triggered by traffic destined to the device. Transit traffic will not cause the riot daemon to crash.\n\nWhen the issue occurs, a core dump and riot log file entry are generated. For example:\n\n /var/crash/core.J-UKERN.mpc0.1557255993.3864.gz\n\n /home/pfe/RIOT logs:\n fpc0 riot[1888]: PANIC in lu_reorder_send_packet_postproc():\n fpc0 riot[6655]: PANIC in lu_reorder_send_packet_postproc():\n\nThis issue affects Juniper Networks Junos OS:\n18.1 versions prior to 18.1R3 on vMX and MX150;\n18.2 versions prior to 18.2R3 on vMX and MX150;\n18.2X75 versions prior to 18.2X75-D60 on vMX and MX150;\n18.3 versions prior to 18.3R3 on vMX and MX150;\n18.4 versions prior to 18.4R2 on vMX and MX150;\n19.1 versions prior to 19.1R2 on vMX and MX150.\nThis issue does not affect Junos OS versions prior to 18.1R1.\n"
|
||||
"value": "A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending the same specific packets, an attacker can repeatedly crash the riot process causing a sustained Denial of Service. Flow cache is specific to vMX based products and the MX150, and is enabled by default in performance mode. This issue can only be triggered by traffic destined to the device. Transit traffic will not cause the riot daemon to crash. When the issue occurs, a core dump and riot log file entry are generated. For example: /var/crash/core.J-UKERN.mpc0.1557255993.3864.gz /home/pfe/RIOT logs: fpc0 riot[1888]: PANIC in lu_reorder_send_packet_postproc(): fpc0 riot[6655]: PANIC in lu_reorder_send_packet_postproc(): This issue affects Juniper Networks Junos OS: 18.1 versions prior to 18.1R3 on vMX and MX150; 18.2 versions prior to 18.2R3 on vMX and MX150; 18.2X75 versions prior to 18.2X75-D60 on vMX and MX150; 18.3 versions prior to 18.3R3 on vMX and MX150; 18.4 versions prior to 18.4R2 on vMX and MX150; 19.1 versions prior to 19.1R2 on vMX and MX150. This issue does not affect Junos OS versions prior to 18.1R1."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -129,7 +129,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading to an information exposure vulnerability.\n\nThis issue affects Juniper Networks Junos OS:\n14.1X53 versions prior to 14.1X53-D53 on EX4300;\n15.1 versions prior to 15.1R7-S6 on EX4300;\n15.1X49 versions prior to 15.1X49-D200, 15.1X49-D210 on EX4300;\n16.1 versions prior to 16.1R7-S7 on EX4300;\n17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on EX4300;\n17.2 versions prior to 17.2R3-S3 on EX4300;\n17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300;\n17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300;\n18.1 versions prior to 18.1R3-S8 on EX4300;\n18.2 versions prior to 18.2R3-S2 on EX4300;\n18.3 versions prior to 18.3R2-S3, 18.3R3, 18.3R3-S1 on EX4300;\n18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300;\n19.1 versions prior to 19.1R1-S4, 19.1R2 on EX4300;\n19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300;\n19.3 versions prior to 19.3R1-S1, 19.3R2 on EX4300."
|
||||
"value": "Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading to an information exposure vulnerability. This issue affects Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D53 on EX4300; 15.1 versions prior to 15.1R7-S6 on EX4300; 15.1X49 versions prior to 15.1X49-D200, 15.1X49-D210 on EX4300; 16.1 versions prior to 16.1R7-S7 on EX4300; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on EX4300; 17.2 versions prior to 17.2R3-S3 on EX4300; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300; 17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300; 18.1 versions prior to 18.1R3-S8 on EX4300; 18.2 versions prior to 18.2R3-S2 on EX4300; 18.3 versions prior to 18.3R2-S3, 18.3R3, 18.3R3-S1 on EX4300; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300; 19.1 versions prior to 19.1R1-S4, 19.1R2 on EX4300; 19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300; 19.3 versions prior to 19.3R1-S1, 19.3R2 on EX4300."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,7 +128,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification.\n\nThis issue does not affect Junos OS device with single RE or stand-alone configuration.\n\nThis issue affects Juniper Networks Junos OS\n12.3 versions prior to 12.3R12-S14;\n12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90;\n14.1X53 versions prior to 14.1X53-D51;\n15.1 versions prior to 15.1R7-S6;\n15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190;\n15.1X53 versions prior to 15.1X53-D592;\n16.1 versions prior to 16.1R4-S13, 16.1R7-S6;\n16.2 versions prior to 16.2R2-S10;\n17.1 versions prior to 17.1R2-S11, 17.1R3-S1;\n17.2 versions prior to 17.2R1-S9, 17.2R3-S3;\n17.3 versions prior to 17.3R3-S6;\n17.4 versions prior to 17.4R2-S6, 17.4R3;\n18.1 versions prior to 18.1R3-S7;\n18.2 versions prior to 18.2R2-S5, 18.2R3-S1;\n18.2 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D420, 18.2X75-D60, 18.2X75-D411;\n18.3 versions prior to 18.3R1-S5, 18.3R2-S1, 18.3R3;\n18.4 versions prior to 18.4R1-S4, 18.4R2-S1, 18.4R3;\n19.1 versions prior to 19.1R1-S2, 19.1R2;\n19.2 versions prior to 19.2R1-S1, 19.2R2."
|
||||
"value": "A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification. This issue does not affect Junos OS device with single RE or stand-alone configuration. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S14; 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190; 15.1X53 versions prior to 15.1X53-D592; 16.1 versions prior to 16.1R4-S13, 16.1R7-S6; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S3; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3-S1; 18.2 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D420, 18.2X75-D60, 18.2X75-D411; 18.3 versions prior to 18.3R1-S5, 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R1-S4, 18.4R2-S1, 18.4R3; 19.1 versions prior to 19.1R1-S2, 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,7 +87,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition.\n\nThis issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability.\n\nThis issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability.\nThis issue affects Juniper Networks Junos OS:\n17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series;\n18.1 versions prior to 18.1R3-S9 on MX Series;\n18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series;\n18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series;\n18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series;\n18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series;\n19.1 versions prior to 19.1R1-S4, 19.1R2 on MX Series;\n19.2 versions prior to 19.2R1-S3, 19.2R2 on MX Series."
|
||||
"value": "Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability. This issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability. This issue affects Juniper Networks Junos OS: 17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S9 on MX Series; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series; 19.1 versions prior to 19.1R1-S4, 19.1R2 on MX Series; 19.2 versions prior to 19.2R1-S3, 19.2R2 on MX Series."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -82,8 +82,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840"
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840",
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840"
|
||||
},
|
||||
{
|
||||
"name": "USN-4302-1",
|
||||
|
Loading…
x
Reference in New Issue
Block a user