| Summary | A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20. |
|---|---|
| Publication Date | Oct. 11, 2018, 3:29 a.m. |
| Registration Date | March 1, 2021, 6:35 p.m. |
| Last Update | Nov. 21, 2024, 12:37 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 7.1 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:N/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* | ||||
| 8 | cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* | ||||
| 9 | cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* | ||||
| 10 | cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* | ||||
| 11 | cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* | ||||
| 12 | cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* | ||||
| 13 | cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* | ||||
| 14 | cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* | ||||
| 15 | cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* | ||||
| 16 | cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* | ||||
| 17 | cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* | ||||
| 18 | cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* | ||||
| 19 | cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* | ||||
| 20 | cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* | ||||
| 21 | cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* | ||||
| 22 | cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* | ||||
| 23 | cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* | ||||
| 24 | cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* | ||||
| 25 | cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* | ||||
| 26 | cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* | ||||
| 27 | cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.2x75:d100:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* | ||||
| 8 | cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:* | ||||
| 9 | cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:* | ||||
| 10 | cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* | ||||
| 11 | cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:* | ||||
| 12 | cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:* | ||||
| 13 | cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:* | ||||
| 14 | cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:* | ||||
| 15 | cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:* | ||||
| 16 | cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* | ||||
| 8 | cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* | ||||
| 9 | cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* | ||||
| 10 | cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* | ||||
| 11 | cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* | ||||
| 12 | cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* | ||||
| 13 | cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* | ||||
| 14 | cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* | ||||
| 15 | cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* | ||||
| Title | Juniper Networks Junos OS における NULL ポインタデリファレンスに関する脆弱性 |
|---|---|
| Summary | Juniper Networks Junos OS には、NULL ポインタデリファレンスに関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 10, 2018, midnight |
| Registration Date | Feb. 27, 2019, 7:49 p.m. |
| Last Update | Feb. 27, 2019, 7:49 p.m. |
| ジュニパーネットワークス |
| Junos OS |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年02月27日] 掲載 |
Feb. 27, 2019, 7:49 p.m. |