mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
179 lines
8.1 KiB
JSON
179 lines
8.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "sirt@juniper.net",
|
|
"DATE_PUBLIC": "2023-01-11T17:00:00.000Z",
|
|
"ID": "CVE-2023-22398",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Junos OS and Junos OS Evolved: RPD might crash when MPLS ping is performed on BGP LSPs"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Junos OS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "15.1",
|
|
"version_value": "15.1R7-S12"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "19.1",
|
|
"version_value": "19.1R3-S9"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "19.2",
|
|
"version_value": "19.2R1-S9, 19.2R3-S5"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "19.3",
|
|
"version_value": "19.3R3-S6"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "19.4",
|
|
"version_value": "19.4R2-S7, 19.4R3-S8"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "20.1",
|
|
"version_value": "20.1R3-S4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "20.2",
|
|
"version_value": "20.2R3-S5"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "20.3",
|
|
"version_value": "20.3R3-S5"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "20.4",
|
|
"version_value": "20.4R3-S4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "21.1",
|
|
"version_value": "21.1R1-S1, 21.1R2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Junos OS Evolved",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "20.4R3-S4-EVO"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "21.1",
|
|
"version_value": "21.1R2-EVO"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Juniper Networks"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS).\n\nWhen an MPLS ping is performed on BGP LSPs, the RPD might crash. Repeated execution of this operation will lead to a sustained DoS.\nThis issue affects:\nJuniper Networks Junos OS:\n15.1 versions prior to 15.1R7-S12;\n19.1 versions prior to 19.1R3-S9;\n19.2 versions prior to 19.2R1-S9, 19.2R3-S5;\n19.3 versions prior to 19.3R3-S6;\n19.4 versions prior to 19.4R2-S7, 19.4R3-S8;\n20.1 versions prior to 20.1R3-S4;\n20.2 versions prior to 20.2R3-S5;\n20.3 versions prior to 20.3R3-S5;\n20.4 versions prior to 20.4R3-S4;\n21.1 versions prior to 21.1R1-S1, 21.1R2;\n\nJuniper Networks Junos OS Evolved:\nAll versions prior to 20.4R3-S4;\n21.1 versions prior to 21.1R2-EVO."
|
|
}
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
|
|
}
|
|
],
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-824 Access of Uninitialized Pointer"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Denial of Service (DoS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://kb.juniper.net/JSA70181",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://kb.juniper.net/JSA70181"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The following software releases have been updated to resolve this specific issue:\nJunos OS: 15.1R7-S12, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R1-S1, 21.1R2, 21.2R1, and all subsequent releases.\nJunos OS Evolved: 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO and all subsequent releases."
|
|
}
|
|
],
|
|
"source": {
|
|
"advisory": "JSA70181",
|
|
"defect": [
|
|
"1593770"
|
|
],
|
|
"discovery": "USER"
|
|
},
|
|
"work_around": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks, hosts and users."
|
|
}
|
|
]
|
|
} |