var-201705-3368
Vulnerability from variot
Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'. plural Juniper Networks Run on device Junos OS Contains an information disclosure vulnerability.Information may be obtained. Juniper Networks QFX3500 and other are Juniper Networks' switch products. Information obtained will aid in further attacks. Junos OS 14.1X53-D40, 15.1X53-D40, 15.1R2 and later fixes the issue. Attackers can exploit this vulnerability to obtain Etherleak memory
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "networks qfx5200", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "networks qfx5100", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "networks qfx3600", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "networks qfx3500", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "networks junos 15.1x53-d35", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1x53-d30", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1x53-d20", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1r1", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f6", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f5-s2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f5", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f4-s2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f4", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f3", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f2-s5", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f2-s2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1f1", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 15.1a2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 14.1x53-d35", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 14.1x53-d30.3", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 14.1x53-d30", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 14.1x53-d28", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks junos 14.1x53-d26", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "networks ex4600", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "networks ex4300", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "0" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "15.1r1" }, { "model": "qfx5200", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "qfx5100", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "qfx3600", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "qfx3500", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "junos 15.1x53-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f5-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1a2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d30.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d28", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d18", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d16", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ex4600", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "ex4300", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "junos 15.1x53-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "BID", "id": "95403" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-2304" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks", "sources": [ { "db": "BID", "id": "95403" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ], "trust": 0.9 }, "cve": "CVE-2017-2304", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-2304", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2017-00554", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-110507", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-2304", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-2304", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-00554", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201701-317", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-110507", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "VULHUB", "id": "VHN-110507" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as \u0027Etherleak\u0027. plural Juniper Networks Run on device Junos OS Contains an information disclosure vulnerability.Information may be obtained. Juniper Networks QFX3500 and other are Juniper Networks\u0027 switch products. Information obtained will aid in further attacks. \nJunos OS 14.1X53-D40, 15.1X53-D40, 15.1R2 and later fixes the issue. Attackers can exploit this vulnerability to obtain Etherleak memory", "sources": [ { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "BID", "id": "95403" }, { "db": "VULHUB", "id": "VHN-110507" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2304", "trust": 3.4 }, { "db": "BID", "id": "95403", "trust": 2.6 }, { "db": "JUNIPER", "id": "JSA10773", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037593", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-004634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201701-317", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-00554", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-110507", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "VULHUB", "id": "VHN-110507" }, { "db": "BID", "id": "95403" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "id": "VAR-201705-3368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "VULHUB", "id": "VHN-110507" } ], "trust": 1.59849624 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" } ] }, "last_update_date": "2023-12-18T13:08:50.436000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10773", "trust": 0.8, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10773\u0026actp=metadata" }, { "title": "Patches for multiple Juniper product information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/88107" }, { "title": "Multiple Juniper Product information disclosure vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66979" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110507" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/95403" }, { "trust": 1.7, "url": "https://kb.juniper.net/jsa10773" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1037593" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2304" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2304" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10773\u0026actp=rss" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "VULHUB", "id": "VHN-110507" }, { "db": "BID", "id": "95403" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-00554" }, { "db": "VULHUB", "id": "VHN-110507" }, { "db": "BID", "id": "95403" }, { "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "db": "NVD", "id": "CVE-2017-2304" }, { "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2017-00554" }, { "date": "2017-05-30T00:00:00", "db": "VULHUB", "id": "VHN-110507" }, { "date": "2017-01-01T00:00:00", "db": "BID", "id": "95403" }, { "date": "2017-07-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "date": "2017-05-30T14:29:00.847000", "db": "NVD", "id": "CVE-2017-2304" }, { "date": "2017-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2017-00554" }, { "date": "2019-05-10T00:00:00", "db": "VULHUB", "id": "VHN-110507" }, { "date": "2017-01-23T02:05:00", "db": "BID", "id": "95403" }, { "date": "2017-07-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004634" }, { "date": "2019-05-10T14:11:58.410000", "db": "NVD", "id": "CVE-2017-2304" }, { "date": "2019-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-317" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-317" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Juniper Networks Run on device Junos OS Vulnerable to information disclosure", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-317" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.