CVE-2017-2315 (GCVE-0-2017-2315)
Vulnerability from cvelistv5 – Published: 2017-04-24 15:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability.
Severity ?
No CVSS data available.
CWE
- denial of service vulnerability due to memory leak
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS on EX series Ethernet Switches with IPv6 enabled |
Affected:
12.3 prior to 12.3R12-S4, 12.3R13
Affected: 13.3 prior to 13.3R10 Affected: 14.1 prior to 14.1R8-S3, 14.1R9 Affected: 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40 Affected: 14.1X55 prior to 14.1X55-D35 Affected: 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8 Affected: 15.1 prior to 15.1R5 Affected: 16.1 before 16.1R3 Affected: 16.2 before 16.2R1-S3, 16.2R2 Affected: 17.1R1 and all subsequent releases have a resolution for this vulnerability |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:48:05.274Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1038253",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038253"
},
{
"name": "97615",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/97615"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/JSA10781"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Junos OS on EX series Ethernet Switches with IPv6 enabled",
"vendor": "Juniper Networks",
"versions": [
{
"status": "affected",
"version": "12.3 prior to 12.3R12-S4, 12.3R13"
},
{
"status": "affected",
"version": "13.3 prior to 13.3R10"
},
{
"status": "affected",
"version": "14.1 prior to 14.1R8-S3, 14.1R9"
},
{
"status": "affected",
"version": "14.1X53 prior ro 14.1X53-D12, 14.1X53-D40"
},
{
"status": "affected",
"version": " 14.1X55 prior to 14.1X55-D35"
},
{
"status": "affected",
"version": "14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8"
},
{
"status": "affected",
"version": "15.1 prior to 15.1R5"
},
{
"status": "affected",
"version": "16.1 before 16.1R3"
},
{
"status": "affected",
"version": "16.2 before 16.2R1-S3, 16.2R2"
},
{
"status": "affected",
"version": "17.1R1 and all subsequent releases have a resolution for this vulnerability"
}
]
}
],
"datePublic": "2017-04-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service vulnerability due to memory leak",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T12:57:01",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"name": "1038253",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038253"
},
{
"name": "97615",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/97615"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/JSA10781"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"ID": "CVE-2017-2315",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS on EX series Ethernet Switches with IPv6 enabled",
"version": {
"version_data": [
{
"version_value": "12.3 prior to 12.3R12-S4, 12.3R13"
},
{
"version_value": "13.3 prior to 13.3R10"
},
{
"version_value": "14.1 prior to 14.1R8-S3, 14.1R9"
},
{
"version_value": "14.1X53 prior ro 14.1X53-D12, 14.1X53-D40"
},
{
"version_value": " 14.1X55 prior to 14.1X55-D35"
},
{
"version_value": "14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8"
},
{
"version_value": "15.1 prior to 15.1R5"
},
{
"version_value": "16.1 before 16.1R3"
},
{
"version_value": "16.2 before 16.2R1-S3, 16.2R2"
},
{
"version_value": "17.1R1 and all subsequent releases have a resolution for this vulnerability"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service vulnerability due to memory leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038253",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038253"
},
{
"name": "97615",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97615"
},
{
"name": "https://kb.juniper.net/JSA10781",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10781"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2017-2315",
"datePublished": "2017-04-24T15:00:00",
"dateReserved": "2016-12-01T00:00:00",
"dateUpdated": "2024-08-05T13:48:05.274Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"371A7DF8-3F4B-439D-8990-D1BC6F0C25C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*\", \"matchCriteriaId\": \"661B4C1E-DB85-4EB0-B26F-F6496CEF0AA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0DD051A-E486-4A9D-A978-A5A980AAF237\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4ED9ACC-B6BA-4128-8934-759BB9EC904F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*\", \"matchCriteriaId\": \"E69DD769-0C8F-4DCE-9F65-411A8CB85322\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6F309FD-0A5A-4C86-B227-B2B511A5CEB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"960059B5-0701-4B75-AB51-0A430247D9F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D1DCA52-DA81-495B-B516-5571F01E3B0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"05E187F6-BACD-4DD5-B393-B2FE4349053A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C240840-A6BC-4E3D-A60D-22F08E67E2B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC90563F-6BCB-4D77-8FD4-584E3A6C7741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AD03BA7-D9EC-420F-97C4-383F79D6873F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FF9FF91-9184-4D18-8288-9110E35F4AE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F2E537B-9504-4912-B231-0D83F4459469\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BCB3837-DCBC-4997-B63E-E47957584709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C88E2B1-469B-442B-9FC0-7C9408CE3917\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FB5A368-E582-4DFD-87B4-C887DA908E47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"70ED0B93-2CFC-474F-B199-F78E1C67E8C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D270B6-1681-4EC5-9BC2-1312A50C8E09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*\", \"matchCriteriaId\": \"41DB14FA-0D58-4AE4-9324-310290F1F0F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:13.3:r9:*:*:*:*:*:*\", \"matchCriteriaId\": \"5617BE56-FAB0-4A26-B311-E4A6C506DE80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C778627-820A-48F5-9680-0205D6DB5EB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA7F03DC-73A2-4760-B386-2A57E9C97E65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CA10003-D52B-4110-9D7A-F50895E6BA17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B2D843A-8ADE-4888-8960-B48394DEA1D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BE66516-A06D-4C0F-8346-DFC8865C8FE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEBDFC9E-7753-42A8-A5C8-4D40D219F93A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"25E5D543-D779-482D-AA8A-6E77C1949FBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A76DAC5-AEC4-47E8-9876-71EE5BAD73E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*\", \"matchCriteriaId\": \"09771B8F-8B2A-4E8B-B4D3-80677697FCF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*\", \"matchCriteriaId\": \"A545D686-25FD-47CD-838A-CF69FB707253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*\", \"matchCriteriaId\": \"84F7C44C-E9ED-4DC4-8AFF-87FAB53EBF5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"79149AA0-17D1-4522-894F-C025F7A30FD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"30726286-7CB1-4E5D-AE44-2B4D84795900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"33BE028F-2961-414A-9D42-C4861566C2DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"E85AB30C-03FC-44DB-A8AA-B916A905CA66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D01CA25F-E1E1-4831-8561-D3B0300BF4A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C31AA11-FA95-4927-9E48-D46BBE4945B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:*\", \"matchCriteriaId\": \"469B95AC-E779-43D2-A24F-B9CB6D5DB9B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E6CD065-EC06-4846-BD2A-D3CA7866070F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7620D01-1A6B-490F-857E-0D803E0AEE56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBE35BDC-7739-4854-8BB8-E8600603DE9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B6097D4-3856-4696-9A26-5B6C0FD9AD6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7572C187-4D58-4E0D-A605-B2B13EFF5C6B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"En Switches EX Series Ethernet de Juniper Networks ejecutando las versiones afectadas del Junos OS, se detect\\u00f3 una vulnerabilidad en el procesamiento IPv6 que puede permitir que un paquete Neighbor Discovery (ND) de IPv6 especialmente dise\\u00f1ado destinado hacia un Switch EX Series Ethernet cause una p\\u00e9rdida de memoria lenta. Una inundaci\\u00f3n de paquetes maliciosos sobre la red de estos paquetes NDP de IPv6 dise\\u00f1ados puede eventualmente conllevar al agotamiento de recursos y a una denegaci\\u00f3n de servicio. Las versiones afectadas de Junos OS son: versiones 12.3 anteriores a 12.3R12-S4,12.3R13; versiones 13.3 anteriores a 13.3R10; versiones 14.1 anteriores a 14.1R8-S3, 14.1R9; versiones 14.1X53 anteriores a 14.1X53-D12, 14.1X53-D40; versiones 14.1X55 anteriores a 14.1X55-D35; versiones 14.2 anteriores a 14.2R6-S4, 14.2R7-S6, 14.2R8; versiones 15.1 anteriores a 15.1R5; versiones 16.1 anteriores a 16.1R3; versiones 16.2 anteriores a 16.2R1-S3, 16.2R2. La versi\\u00f3n 17.1R1 y todas las versiones posteriores tienen una resoluci\\u00f3n para esta vulnerabilidad.\"}]",
"id": "CVE-2017-2315",
"lastModified": "2024-11-21T03:23:16.130",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-04-24T15:59:00.237",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/97615\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038253\", \"source\": \"sirt@juniper.net\"}, {\"url\": \"https://kb.juniper.net/JSA10781\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/97615\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038253\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.juniper.net/JSA10781\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-772\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-2315\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2017-04-24T15:59:00.237\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability.\"},{\"lang\":\"es\",\"value\":\"En Switches EX Series Ethernet de Juniper Networks ejecutando las versiones afectadas del Junos OS, se detect\u00f3 una vulnerabilidad en el procesamiento IPv6 que puede permitir que un paquete Neighbor Discovery (ND) de IPv6 especialmente dise\u00f1ado destinado hacia un Switch EX Series Ethernet cause una p\u00e9rdida de memoria lenta. Una inundaci\u00f3n de paquetes maliciosos sobre la red de estos paquetes NDP de IPv6 dise\u00f1ados puede eventualmente conllevar al agotamiento de recursos y a una denegaci\u00f3n de servicio. Las versiones afectadas de Junos OS son: versiones 12.3 anteriores a 12.3R12-S4,12.3R13; versiones 13.3 anteriores a 13.3R10; versiones 14.1 anteriores a 14.1R8-S3, 14.1R9; versiones 14.1X53 anteriores a 14.1X53-D12, 14.1X53-D40; versiones 14.1X55 anteriores a 14.1X55-D35; versiones 14.2 anteriores a 14.2R6-S4, 14.2R7-S6, 14.2R8; versiones 15.1 anteriores a 15.1R5; versiones 16.1 anteriores a 16.1R3; versiones 16.2 anteriores a 16.2R1-S3, 16.2R2. La versi\u00f3n 17.1R1 y todas las versiones posteriores tienen una resoluci\u00f3n para esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"371A7DF8-3F4B-439D-8990-D1BC6F0C25C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*\",\"matchCriteriaId\":\"661B4C1E-DB85-4EB0-B26F-F6496CEF0AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0DD051A-E486-4A9D-A978-A5A980AAF237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4ED9ACC-B6BA-4128-8934-759BB9EC904F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69DD769-0C8F-4DCE-9F65-411A8CB85322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F309FD-0A5A-4C86-B227-B2B511A5CEB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"960059B5-0701-4B75-AB51-0A430247D9F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1DCA52-DA81-495B-B516-5571F01E3B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E187F6-BACD-4DD5-B393-B2FE4349053A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C240840-A6BC-4E3D-A60D-22F08E67E2B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC90563F-6BCB-4D77-8FD4-584E3A6C7741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD03BA7-D9EC-420F-97C4-383F79D6873F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF9FF91-9184-4D18-8288-9110E35F4AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2E537B-9504-4912-B231-0D83F4459469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BCB3837-DCBC-4997-B63E-E47957584709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C88E2B1-469B-442B-9FC0-7C9408CE3917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB5A368-E582-4DFD-87B4-C887DA908E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"70ED0B93-2CFC-474F-B199-F78E1C67E8C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D270B6-1681-4EC5-9BC2-1312A50C8E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DB14FA-0D58-4AE4-9324-310290F1F0F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5617BE56-FAB0-4A26-B311-E4A6C506DE80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C778627-820A-48F5-9680-0205D6DB5EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7F03DC-73A2-4760-B386-2A57E9C97E65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA10003-D52B-4110-9D7A-F50895E6BA17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2D843A-8ADE-4888-8960-B48394DEA1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE66516-A06D-4C0F-8346-DFC8865C8FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBDFC9E-7753-42A8-A5C8-4D40D219F93A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E5D543-D779-482D-AA8A-6E77C1949FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A76DAC5-AEC4-47E8-9876-71EE5BAD73E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"09771B8F-8B2A-4E8B-B4D3-80677697FCF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*\",\"matchCriteriaId\":\"A545D686-25FD-47CD-838A-CF69FB707253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F7C44C-E9ED-4DC4-8AFF-87FAB53EBF5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79149AA0-17D1-4522-894F-C025F7A30FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"30726286-7CB1-4E5D-AE44-2B4D84795900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BE028F-2961-414A-9D42-C4861566C2DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85AB30C-03FC-44DB-A8AA-B916A905CA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01CA25F-E1E1-4831-8561-D3B0300BF4A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C31AA11-FA95-4927-9E48-D46BBE4945B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"469B95AC-E779-43D2-A24F-B9CB6D5DB9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6CD065-EC06-4846-BD2A-D3CA7866070F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7620D01-1A6B-490F-857E-0D803E0AEE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE35BDC-7739-4854-8BB8-E8600603DE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6097D4-3856-4696-9A26-5B6C0FD9AD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7572C187-4D58-4E0D-A605-B2B13EFF5C6B\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/97615\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038253\",\"source\":\"sirt@juniper.net\"},{\"url\":\"https://kb.juniper.net/JSA10781\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/JSA10781\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…