mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
268 lines
9.3 KiB
JSON
268 lines
9.3 KiB
JSON
{
|
|
"id": "CVE-2018-0014",
|
|
"sourceIdentifier": "sirt@juniper.net",
|
|
"published": "2018-01-10T22:29:01.463",
|
|
"lastModified": "2024-11-21T03:37:21.593",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los dispositivos Juniper Networks ScreenOS no rellenan con ceros los paquetes Ethernet, por lo que algunos paquetes podr\u00edan contener fragmentos de memoria del sistema o datos de paquetes anteriores. Este problema se suele detectar como CVE-2003-0001. Este problema afecta a todas las versiones de Juniper Networks ScreenOS anteriores a 6.3.0r25."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "sirt@juniper.net",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 3.3,
|
|
"accessVector": "ADJACENT_NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.5,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "128A2A6F-24CA-4303-926B-C962E38FC324"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2085C6EB-8F7E-4C88-830C-36F4C003E96F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D30EBD81-2218-4DCA-BC4F-4624B41563DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B43E97D7-5525-4B83-9FB7-B36449F84E28"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E85EE82-8F34-4E21-8682-310BC6E53A31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8272D51C-59EB-480D-B8A4-23976C51036F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43D62963-ACE0-47A3-AEF3-A12454D7E7E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4835C1B4-EB1A-488B-9799-E5C5D9279B06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F6BD8C5-7808-404C-BD87-C68CC7DF6E67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78EDC6F7-C346-4497-B5F8-D1282E1E7015"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42A5CF27-9A1F-4008-96C9-08B4C9FE2CE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9D823AC-5826-4C23-B84D-0E4142D0B5D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "029D2916-2D70-4852-971E-8A457738C979"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C223BBB3-DF4D-4FB1-9E8C-516BF34D52D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AD6586D-D83E-4FED-A80C-6E30C52EA892"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E362A871-0E72-4F43-BDC0-DD35435545BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC4F87AC-98C0-46C0-8998-AE89433800FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76337F8E-365F-4127-8C7D-C9A7AF1B8782"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5137B6ED-2C48-45D0-BA8E-635D6667B3AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AEECE2C5-6394-40ED-942C-3347FD442130"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "088F36E4-6D30-4419-8218-9674B3F452B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F274BB9-3B67-469D-AB5D-11C46F5BFAAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED0002B9-D6DD-4A24-8EE1-B19BF9ECDF5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "571F99F3-95F5-456D-B6DD-330C1A77BE80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1090782C-8BCD-4643-A740-1464D0D85C82"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1040185",
|
|
"source": "sirt@juniper.net",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://kb.juniper.net/JSA10841",
|
|
"source": "sirt@juniper.net",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1040185",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://kb.juniper.net/JSA10841",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |