2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2018-0014" ,
"sourceIdentifier" : "sirt@juniper.net" ,
"published" : "2018-01-10T22:29:01.463" ,
2024-11-23 09:11:19 +00:00
"lastModified" : "2024-11-21T03:37:21.593" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25."
} ,
{
"lang" : "es" ,
"value" : "Los dispositivos Juniper Networks ScreenOS no rellenan con ceros los paquetes Ethernet, por lo que algunos paquetes podr\u00edan contener fragmentos de memoria del sistema o datos de paquetes anteriores. Este problema se suele detectar como CVE-2003-0001. Este problema afecta a todas las versiones de Juniper Networks ScreenOS anteriores a 6.3.0r25."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
2024-11-23 09:11:19 +00:00
"source" : "sirt@juniper.net" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.0" ,
2024-11-23 09:11:19 +00:00
"vectorString" : "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-11-23 09:11:19 +00:00
"confidentialityImpact" : "LOW" ,
2023-04-24 12:24:31 +02:00
"integrityImpact" : "NONE" ,
2024-11-23 09:11:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
2024-11-23 09:11:19 +00:00
"impactScore" : 1.4
2023-04-24 12:24:31 +02:00
} ,
{
2024-11-23 09:11:19 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.0" ,
2024-11-23 09:11:19 +00:00
"vectorString" : "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-11-23 09:11:19 +00:00
"confidentialityImpact" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"integrityImpact" : "NONE" ,
2024-11-23 09:11:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
2024-11-23 09:11:19 +00:00
"impactScore" : 3.6
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:A/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-23 09:11:19 +00:00
"baseScore" : 3.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "ADJACENT_NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-23 09:11:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 6.5 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "128A2A6F-24CA-4303-926B-C962E38FC324"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2085C6EB-8F7E-4C88-830C-36F4C003E96F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D30EBD81-2218-4DCA-BC4F-4624B41563DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B43E97D7-5525-4B83-9FB7-B36449F84E28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E85EE82-8F34-4E21-8682-310BC6E53A31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8272D51C-59EB-480D-B8A4-23976C51036F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43D62963-ACE0-47A3-AEF3-A12454D7E7E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4835C1B4-EB1A-488B-9799-E5C5D9279B06"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F6BD8C5-7808-404C-BD87-C68CC7DF6E67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78EDC6F7-C346-4497-B5F8-D1282E1E7015"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42A5CF27-9A1F-4008-96C9-08B4C9FE2CE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9D823AC-5826-4C23-B84D-0E4142D0B5D4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "029D2916-2D70-4852-971E-8A457738C979"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C223BBB3-DF4D-4FB1-9E8C-516BF34D52D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AD6586D-D83E-4FED-A80C-6E30C52EA892"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E362A871-0E72-4F43-BDC0-DD35435545BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC4F87AC-98C0-46C0-8998-AE89433800FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76337F8E-365F-4127-8C7D-C9A7AF1B8782"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5137B6ED-2C48-45D0-BA8E-635D6667B3AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEECE2C5-6394-40ED-942C-3347FD442130"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "088F36E4-6D30-4419-8218-9674B3F452B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F274BB9-3B67-469D-AB5D-11C46F5BFAAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED0002B9-D6DD-4A24-8EE1-B19BF9ECDF5E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "571F99F3-95F5-456D-B6DD-330C1A77BE80"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1090782C-8BCD-4643-A740-1464D0D85C82"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securitytracker.com/id/1040185" ,
"source" : "sirt@juniper.net" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://kb.juniper.net/JSA10841" ,
"source" : "sirt@juniper.net" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 09:11:19 +00:00
} ,
{
"url" : "http://www.securitytracker.com/id/1040185" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://kb.juniper.net/JSA10841" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}