mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
100 lines
4.2 KiB
JSON
100 lines
4.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-39551",
|
||
|
"sourceIdentifier": "sirt@juniper.net",
|
||
|
"published": "2024-07-11T17:15:16.140",
|
||
|
"lastModified": "2024-07-11T17:15:16.140",
|
||
|
"vulnStatus": "Received",
|
||
|
"cveTags": [],
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of\u00a0 Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an\u00a0unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).\u00a0\n\nContinued receipt and processing of these specific packets will sustain the Denial of Service condition.\n\nThe memory usage can be monitored using the below command.\n\n\u2003\u2003user@host> show usp memory segment sha data objcache jsf\u00a0\nThis issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:\u00a0\n\n * \u200320.4 before 20.4R3-S10,\u00a0\n * \u200321.2 before 21.2R3-S6,\u00a0\n * \u200321.3 before 21.3R3-S5,\u00a0\n * \u200321.4 before 21.4R3-S6,\u00a0\n * \u200322.1 before 22.1R3-S4,\u00a0\n * \u200322.2 before 22.2R3-S2,\u00a0\n * \u200322.3 before 22.3R3-S1,\u00a0\n * \u200322.4 before 22.4R3,\u00a0\n * \u200323.2 before 23.2R2."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV40": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "4.0",
|
||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"attackRequirements": "NONE",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"vulnerableSystemConfidentiality": "NONE",
|
||
|
"vulnerableSystemIntegrity": "NONE",
|
||
|
"vulnerableSystemAvailability": "HIGH",
|
||
|
"subsequentSystemConfidentiality": "NONE",
|
||
|
"subsequentSystemIntegrity": "NONE",
|
||
|
"subsequentSystemAvailability": "LOW",
|
||
|
"exploitMaturity": "NOT_DEFINED",
|
||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||
|
"integrityRequirements": "NOT_DEFINED",
|
||
|
"availabilityRequirements": "NOT_DEFINED",
|
||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||
|
"safety": "NOT_DEFINED",
|
||
|
"automatable": "NOT_DEFINED",
|
||
|
"recovery": "NOT_DEFINED",
|
||
|
"valueDensity": "NOT_DEFINED",
|
||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||
|
"providerUrgency": "NOT_DEFINED",
|
||
|
"baseScore": 8.7,
|
||
|
"baseSeverity": "HIGH"
|
||
|
}
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-400"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://supportportal.juniper.net/JSA83013",
|
||
|
"source": "sirt@juniper.net"
|
||
|
}
|
||
|
]
|
||
|
}
|