mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
298 lines
16 KiB
JSON
298 lines
16 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-36836",
|
|
"ASSIGNER": "sirt@juniper.net",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed. The rpd crash will impact all routing protocols until the process has automatically been restarted. As the operational state which makes this issue exploitable is outside the attackers control, this issue is considered difficult to exploit. Continued execution of this command will lead to a sustained DoS.\n\nThis issue affects:\nJuniper Networks Junos OS\n19.4 version 19.4R3-S5 and later versions prior to 19.4R3-S9;\n20.1 version 20.1R2 and later versions;\n20.2 versions prior to 20.2R3-S7;\n20.3 versions prior to 20.3R3-S5;\n20.4 versions prior to 20.4R3-S6;\n21.1 versions prior to 21.1R3-S4;\n21.2 versions prior to 21.2R3-S2;\n21.3 versions prior to 21.3R3-S1;\n21.4 versions prior to 21.4R3;\n22.1 versions prior to 22.1R1-S2, 22.1R2;\n22.2 versions prior to 22.2R2.\n\nJuniper Networks Junos OS Evolved\nAll versions prior to 20.4R3-S6-EVO;\n21.1-EVO version 21.1R1-EVO and later versions;\n21.2-EVO version 21.2R1-EVO and later versions;\n21.3-EVO versions prior to 21.3R3-S1-EVO;\n21.4-EVO versions prior to 21.4R3-EVO;\n22.1-EVO versions prior to 22.1R1-S2-EVO, 22.1R2-EVO;\n22.2-EVO versions prior to 22.2R2-EVO.\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-908 Use of Uninitialized Resource",
|
|
"cweId": "CWE-908"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Denial of Service (DoS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Juniper Networks",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Junos OS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "19.4R3-S9",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "19.4*",
|
|
"status": "affected",
|
|
"version": "19.4R3-S4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.1*",
|
|
"status": "affected",
|
|
"version": "20.1R2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.2R3-S7",
|
|
"status": "affected",
|
|
"version": "20.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.3R3-S5",
|
|
"status": "affected",
|
|
"version": "20.3",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.4R3-S6",
|
|
"status": "affected",
|
|
"version": "20.4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.1R3-S4",
|
|
"status": "affected",
|
|
"version": "21.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.2R3-S2",
|
|
"status": "affected",
|
|
"version": "21.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.3R3-S1",
|
|
"status": "affected",
|
|
"version": "21.3",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.4R3",
|
|
"status": "affected",
|
|
"version": "21.4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.1R1-S2, 22.1R2",
|
|
"status": "affected",
|
|
"version": "22.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.2R2",
|
|
"status": "affected",
|
|
"version": "22.2",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Junos OS Evolved",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"lessThan": "20.4R3-S6-EVO",
|
|
"status": "affected",
|
|
"version": "unspecified",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "21.1R1-EVO",
|
|
"status": "affected"
|
|
}
|
|
],
|
|
"lessThan": "21.1*",
|
|
"status": "affected",
|
|
"version": "21.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "21.2R1-EVO",
|
|
"status": "affected"
|
|
}
|
|
],
|
|
"lessThan": "21.2*",
|
|
"status": "affected",
|
|
"version": "21.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.3R3-S1-EVO",
|
|
"status": "affected",
|
|
"version": "21.3",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.4R3-EVO",
|
|
"status": "affected",
|
|
"version": "21.4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.1R1-S2-EVO, 22.1R2-EVO",
|
|
"status": "affected",
|
|
"version": "22.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.2R2-EVO",
|
|
"status": "affected",
|
|
"version": "22.2",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://supportportal.juniper.net/JSA71643",
|
|
"refsource": "MISC",
|
|
"name": "https://supportportal.juniper.net/JSA71643"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"advisory": "JSA71643",
|
|
"defect": [
|
|
"1658458",
|
|
"1657491"
|
|
],
|
|
"discovery": "USER"
|
|
},
|
|
"configuration": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "To be exposed to this issue an interface need to be configured as follows:<br><br><tt> [ routing-options multicast stream-protection ]</tt>"
|
|
}
|
|
],
|
|
"value": "To be exposed to this issue an interface need to be configured as follows:\n\n\u00a0 [ routing-options multicast stream-protection ]"
|
|
}
|
|
],
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "There are no known workarounds for this issue.<br>"
|
|
}
|
|
],
|
|
"value": "There are no known workarounds for this issue.\n"
|
|
}
|
|
],
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>"
|
|
}
|
|
],
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n"
|
|
}
|
|
],
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "The following software releases have been updated to resolve this specific issue:<br>Junos OS: 19.4R3-S9, 20.2R3-S7, 20.3R3-S5, 20.4R3-S6, 21.1R3-S4, 21.2R3-S2, 21.3R3-S1, 21.4R3, 22.1R1-S2, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases;<br>Junos OS Evolved: 20.4R3-S6-EVO, 21.3R3-S1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO , and all subsequent releases.<br>"
|
|
}
|
|
],
|
|
"value": "The following software releases have been updated to resolve this specific issue:\nJunos OS: 19.4R3-S9, 20.2R3-S7, 20.3R3-S5, 20.4R3-S6, 21.1R3-S4, 21.2R3-S2, 21.3R3-S1, 21.4R3, 22.1R1-S2, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases;\nJunos OS Evolved: 20.4R3-S6-EVO, 21.3R3-S1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO , and all subsequent releases.\n"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 4.7,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |