| Summary | An error handling vulnerability in Routing Protocols Daemon (RPD) of Juniper Networks Junos OS allows an attacker to cause RPD to crash. Continued receipt of this malformed MPLS RSVP packet will cause a sustained Denial of Service condition. Affected releases are Juniper Networks Junos OS: 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D48 on QFX Switching; 14.2 versions prior to 14.1X53-D130 on QFabric System; 14.2 versions prior to 14.2R4. This issue does not affect versions of Junos OS before 14.1R1. Junos OS RSVP only supports IPv4. IPv6 is not affected by this issue. This issue require it to be received on an interface configured to receive this type of traffic. |
|---|---|
| Publication Date | Oct. 11, 2018, 3:29 a.m. |
| Registration Date | March 1, 2021, 6:35 p.m. |
| Last Update | Nov. 21, 2024, 12:37 p.m. |
| CVSS3.0 : MEDIUM | |
| スコア | 5.9 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d48:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:* | |||||
| Title | Juniper Networks Junos OS における入力確認に関する脆弱性 |
|---|---|
| Summary | Juniper Networks Junos OS には、入力確認に関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 10, 2018, midnight |
| Registration Date | Feb. 26, 2019, 5:17 p.m. |
| Last Update | Feb. 26, 2019, 5:17 p.m. |
| ジュニパーネットワークス |
| Junos OS 14.1R8-S5 未満の 14.1 |
| Junos OS 14.1R9 未満の 14.1 |
| Junos OS 14.1X53-D130 (QFabric System) 未満の 14.2 |
| Junos OS 14.1X53-D48 (QFX Switching) 未満の 14.1X53 |
| Junos OS 14.2R4 未満の 14.2 |
| Junos OS 14.1R8-S5 未満の 14.1 |
| Junos OS 14.1R9 未満の 14.1 |
| Junos OS 14.1X53-D130 (QFabric System) 未満の 14.2 |
| Junos OS 14.1X53-D48 (QFX Switching) 未満の 14.1X53 |
| Junos OS 14.2R4 未満の 14.2 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年02月26日] 掲載 |
Feb. 26, 2019, 5:17 p.m. |