mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
167 lines
5.7 KiB
JSON
167 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2016-1260",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-01-15T19:59:08.400",
|
|
"lastModified": "2016-12-03T03:20:06.963",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Juniper Junos OS before 13.2X51-D36, 14.1X53 before 14.1X53-D25, and 15.2 before 15.2R1 on EX4300 series switches allow remote attackers to cause a denial of service (network loop and bandwidth consumption) via unspecified vectors related to Spanning Tree Protocol (STP) traffic."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Juniper Junos OS en versiones anteriores a 13.2X51-D36, 14.1X53 en versiones anteriores a 14.1X53-D25 y 15.2 en versiones anteriores a 15.2R1 en switches de las series EX4300 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle de red y consumo de ancho de banda) a trav\u00e9s de vectores no especificados relacionados con tr\u00e1fico Spanning Tree Protocol (STP)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3947A516-2054-48B3-ADFD-3CF88EC2288D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0951235-4A0A-4200-A7B1-9FF4540A3755"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d21:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E3A9AB1-202A-4480-8FFD-872C79325854"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d25:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7478F581-8A89-49D7-B9F9-E0E90BEEAEE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d26:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28B80348-B130-4178-BFD9-4AE390E139D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d30:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1EE6518-C224-4019-8393-85893AC29898"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:13.2x51:d35:*:*:*:*:*:*",
|
|
"matchCriteriaId": "718A304D-1DBD-4BC1-B038-2BD4755E8793"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C7FCCC1-B151-465A-8327-26DB5DC074F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09771B8F-8B2A-4E8B-B4D3-80677697FCF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1AA12C5-4520-4F79-80BE-66112F7AFC2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
|
|
"matchCriteriaId": "807C8110-5CC2-45F0-B094-BBF9C0B63BDD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:14.1x53:r1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F976AE31-75F6-4A52-A8F0-DCDDF62BBEEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:15.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57342DBF-5D18-42C7-B69C-C603E2C4D5AE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10719",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1035106",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |