{ "id": "CVE-2015-7748", "sourceIdentifier": "cve@mitre.org", "published": "2015-10-19T18:59:00.127", "lastModified": "2024-11-21T02:37:19.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Juniper chassis with Trio (Trinity) chipset line cards and Junos OS 13.3 before 13.3R8, 14.1 before 14.1R6, 14.2 before 14.2R5, and 15.1 before 15.1R2 allow remote attackers to cause a denial of service (MPC line card crash) via a crafted uBFD packet." }, { "lang": "es", "value": "El chasis de Juniper con tarjetas de l\u00ednea con chipset Trio (Trinity) y Junos OS 13.3 en versiones anteriores a 13.3R8, 14.1 en versiones anteriores a 14.1R6, 14.2 en versiones anteriores a 14.2R5 y 15.1 en versiones anteriores a 15.1R2 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la tajeta de l\u00ednea MPC) a trav\u00e9s de un paquete uBFD manipulado." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4AF5DAA-62F5-491F-A9CE-098970671D43" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "matchCriteriaId": "3FF9FF91-9184-4D18-8288-9110E35F4AE5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "matchCriteriaId": "0F2E537B-9504-4912-B231-0D83F4459469" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*", "matchCriteriaId": "99A946CE-FFC7-4F16-82F4-795A6E5B84C2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "matchCriteriaId": "4BCB3837-DCBC-4997-B63E-E47957584709" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "matchCriteriaId": "6C88E2B1-469B-442B-9FC0-7C9408CE3917" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*", "matchCriteriaId": "1FB5A368-E582-4DFD-87B4-C887DA908E47" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*", "matchCriteriaId": "70ED0B93-2CFC-474F-B199-F78E1C67E8C7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*", "matchCriteriaId": "B8D270B6-1681-4EC5-9BC2-1312A50C8E09" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "6237291A-B861-4D53-B7AA-C53A44B76896" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "matchCriteriaId": "9C778627-820A-48F5-9680-0205D6DB5EB6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "matchCriteriaId": "FA7F03DC-73A2-4760-B386-2A57E9C97E65" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*", "matchCriteriaId": "0CA10003-D52B-4110-9D7A-F50895E6BA17" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*", "matchCriteriaId": "1B2D843A-8ADE-4888-8960-B48394DEA1D2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*", "matchCriteriaId": "3BE66516-A06D-4C0F-8346-DFC8865C8FE8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "matchCriteriaId": "79149AA0-17D1-4522-894F-C025F7A30FD7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*", "matchCriteriaId": "30726286-7CB1-4E5D-AE44-2B4D84795900" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*", "matchCriteriaId": "33BE028F-2961-414A-9D42-C4861566C2DC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*", "matchCriteriaId": "E85AB30C-03FC-44DB-A8AA-B916A905CA66" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "BD0952C4-FFCC-4A78-ADFC-289BD6E269DB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "matchCriteriaId": "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3" } ] } ] } ], "references": [ { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10701", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/101103", "source": "cve@mitre.org" }, { "url": "http://www.securitytracker.com/id/1033858", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10701", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/101103", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securitytracker.com/id/1033858", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ] } ] }