CVE-2018-0001
| Summary |
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.
|
| Publication Date |
Jan. 11, 2018, 7:29 a.m. |
| Registration Date |
March 1, 2021, 6:35 p.m. |
| Last Update |
Nov. 21, 2024, 12:37 p.m. |
|
CVSS3.0 : CRITICAL
|
| スコア |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
不要 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
高 |
| 完全性への影響(I) |
高 |
| 可用性への影響(A) |
高 |
|
CVSS2.0 : HIGH
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
低 |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
いいえ
|
| User operation required |
いいえ
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:* |
|
|
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* |
|
|
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:* |
|
|
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:* |
|
|
|
|
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:* |
|
|
|
|
| Configuration7 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:* |
|
|
|
|
| Configuration8 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:* |
|
|
|
|
| Configuration9 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List
JVN Vulnerability Information
Juniper Networks Junos OS における解放済みメモリの使用に関する脆弱性
| Title |
Juniper Networks Junos OS における解放済みメモリの使用に関する脆弱性
|
| Summary |
Juniper Networks Junos OS には、解放済みメモリの使用に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Jan. 10, 2018, midnight |
| Registration Date |
March 5, 2018, 12:09 p.m. |
| Last Update |
March 5, 2018, 12:09 p.m. |
Affected System
| ジュニパーネットワークス |
|
Junos OS 12.1X46-D67 未満の 12.1X46
|
|
Junos OS 12.3R12-S5 未満の 12.3
|
|
Junos OS 12.3X48-D35 未満の 12.3X48
|
|
Junos OS 14.1R8-S5 未満の 14.1
|
|
Junos OS 14.1R9
|
|
Junos OS 14.1X53-D44 未満の 14.1X53
|
|
Junos OS 14.1X53-D50
|
|
Junos OS 14.2R7-S7 未満の 14.2
|
|
Junos OS 14.2R8
|
|
Junos OS 15.1R3 未満の 15.1
|
|
Junos OS 15.1X49-D30 未満の 15.1X49
|
|
Junos OS 15.1X53-D70 未満の 15.1X53
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年03月05日] 掲載 |
March 5, 2018, 12:09 p.m. |