NVD Vulnerability Detail
Search Exploit, PoC
CVE-2018-0049
Summary

A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.

Publication Date Oct. 11, 2018, 3:29 a.m.
Registration Date March 1, 2021, 6:35 p.m.
Last Update Nov. 21, 2024, 12:37 p.m.
CVSS3.1 : HIGH
スコア 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
CVSS2.0 : HIGH
Score 7.1
Vector AV:N/AC:M/Au:N/C:N/I:N/A:C
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*
3 cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*
4 cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*
5 cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*
6 cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*
7 cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*
8 cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*
9 cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*
10 cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*
11 cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*
12 cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*
13 cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*
14 cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*
15 cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*
16 cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*
17 cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*
18 cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*
19 cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*
20 cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*
21 cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*
22 cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*
23 cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*
24 cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*
25 cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*
26 cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*
27 cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.2x75:d100:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*
3 cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*
4 cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*
5 cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*
6 cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*
7 cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*
8 cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*
9 cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*
10 cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*
11 cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*
12 cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*
13 cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*
14 cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*
15 cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*
16 cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*
3 cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*
4 cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*
5 cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*
6 cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*
7 cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*
8 cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*
9 cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*
10 cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*
11 cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*
12 cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*
13 cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*
14 cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*
15 cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*
Configuration7 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:*
3 cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:*
4 cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:*
5 cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:*
6 cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*
7 cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*
Configuration8 or higher or less more than less than
cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*
2 cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Juniper Networks Junos OS における NULL ポインタデリファレンスに関する脆弱性
Title Juniper Networks Junos OS における NULL ポインタデリファレンスに関する脆弱性
Summary

Juniper Networks Junos OS には、NULL ポインタデリファレンスに関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Oct. 10, 2018, midnight
Registration Date Feb. 27, 2019, 7:49 p.m.
Last Update Feb. 27, 2019, 7:49 p.m.
Affected System
ジュニパーネットワークス
Junos OS 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2019年02月27日]
  掲載
Feb. 27, 2019, 7:49 p.m.