var-201904-1548
Vulnerability from variot
A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are: 14.1X53; 15.1X53 versions prior to 15.1X53-D235; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2, 17.3R4; 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1, 18.1R4; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2. Junos OS Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a stack-based buffer-overflow vulnerability. Attackers can exploit this issue to crash the affected system, denying service to legitimate users or to execute arbitrary code. Juniper Networks QFX5000 and others are products of Juniper Networks (Juniper Networks). The Juniper Networks QFX5000 is a 5000 series enterprise switch. The Juniper Networks EX4300 is a 4300 series enterprise switch. The Juniper Networks EX4600 is a 4600 series enterprise switch. Junos OS is a set of network operating systems dedicated to the company's hardware devices. An erroneous read or write operation was performed on another associated memory location. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following releases are affected: Junos OS Release 14.1X53, Release 15.1X53, Release 17.1, Release 17.2, Release 17.3, Release 17.4, Release 18.1, Release 18.2, Release 18.2X75, Release 18.3
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-1548", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "18.1" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "17.4" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "17.3" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "17.2r3" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "18.3r2" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "18.2x75" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "17.1r3" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "18.2r2" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "18.2" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "17.2" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "18.1r3-s1" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "17.3r3-s2" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "18.2x75-d30" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "17.3" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "17.4" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "18.1" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "17.4r2-s1" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "17.1" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos", "scope": "gte", "trust": 1.0, "vendor": "juniper", "version": "18.3" }, { "model": "junos", "scope": "lt", "trust": 1.0, "vendor": "juniper", "version": "15.1x53-d235" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.2r2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "18.2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "18.3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "18.1" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "17.3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1x53-d235" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.3r2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "17.4" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.1r3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "17.2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.1r4" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.4r3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "18.2x75" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.4r2-s1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.1r3-s1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.3r3-s2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.2x75-d30" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "17.1" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.3r4" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.2r3" }, { "model": "junos 18.3r1-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.3r1-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.3r1-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.3r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "18.3" }, { "model": "junos 18.2x75-d5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2x75-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2x75-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "18.2x75" }, { "model": "junos 18.2r1-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2r1-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2r1-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "18.2" }, { "model": "junos 18.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r2-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r2-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1-s7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1-s6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r3-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r2-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r2-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r2-s6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r2-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1-s8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1-s7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "17.2" }, { "model": "junos 17.1r2-s9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2-s10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r1-s7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r1-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "17.1" }, { "model": "junos 15.1x53-d70", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d68", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d67", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d66", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d65", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d64", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d63", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d62", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d60", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d59", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d58", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d57", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d55", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d50", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d49", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d48", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d47", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d33", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d31", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d234", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d233", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d232", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d231", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d230", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d105", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos 14.1x53-d50", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d48", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d47", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d45", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d44", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d42", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d30.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d28", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d18", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d16", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.3r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2x75-d30", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 18.1r3-s1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.4r2-s1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.3r3-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.1r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d235", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d51", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "107897" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.2r2", "versionStartIncluding": "18.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.1r3-s1", "versionStartIncluding": "18.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.4r2-s1", "versionStartIncluding": "17.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3r2", "versionStartIncluding": "18.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.2x75-d30", "versionStartIncluding": "18.2x75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.1r3", "versionStartIncluding": "17.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.1x53-d235", "versionStartIncluding": "15.1x53", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.3r3-s2", "versionStartIncluding": "17.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.2r3", "versionStartIncluding": "17.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5200-48y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5200-32c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:juniper:qfx5210-64c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0008" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "107897" } ], "trust": 0.3 }, "cve": "CVE-2019-0008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-0008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-140039", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "sirt@juniper.net", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-0008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0008", "trust": 1.8, "value": "CRITICAL" }, { "author": "sirt@juniper.net", "id": "CVE-2019-0008", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201904-555", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-140039", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-0008", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140039" }, { "db": "VULMON", "id": "CVE-2019-0008" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are: 14.1X53; 15.1X53 versions prior to 15.1X53-D235; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2, 17.3R4; 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1, 18.1R4; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2. Junos OS Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a stack-based buffer-overflow vulnerability. \nAttackers can exploit this issue to crash the affected system, denying service to legitimate users or to execute arbitrary code. Juniper Networks QFX5000 and others are products of Juniper Networks (Juniper Networks). The Juniper Networks QFX5000 is a 5000 series enterprise switch. The Juniper Networks EX4300 is a 4300 series enterprise switch. The Juniper Networks EX4600 is a 4600 series enterprise switch. Junos OS is a set of network operating systems dedicated to the company\u0027s hardware devices. An erroneous read or write operation was performed on another associated memory location. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following releases are affected: Junos OS Release 14.1X53, Release 15.1X53, Release 17.1, Release 17.2, Release 17.3, Release 17.4, Release 18.1, Release 18.2, Release 18.2X75, Release 18.3", "sources": [ { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "BID", "id": "107897" }, { "db": "VULHUB", "id": "VHN-140039" }, { "db": "VULMON", "id": "CVE-2019-0008" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0008", "trust": 2.9 }, { "db": "JUNIPER", "id": "JSA10930", "trust": 2.1 }, { "db": "BID", "id": "107897", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2019-003383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-555", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1269", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-140039", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-0008", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140039" }, { "db": "VULMON", "id": "CVE-2019-0008" }, { "db": "BID", "id": "107897" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "id": "VAR-201904-1548", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140039" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:28:33.313000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10930", "trust": 0.8, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10930\u0026actp=metadata" }, { "title": "Juniper Networks QFX5000 , EX4300 and EX4600 Junos OS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91370" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140039" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/107897" }, { "trust": 1.8, "url": "https://kb.juniper.net/jsa10930" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0008" }, { "trust": 0.9, "url": "https://www.juniper.net/us/en/" }, { "trust": 0.9, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10930\u0026actp=metadata" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0008" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10930" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/junos-os-qfx-ex-buffer-overflow-via-fxpc-29019" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78990" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140039" }, { "db": "VULMON", "id": "CVE-2019-0008" }, { "db": "BID", "id": "107897" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140039" }, { "db": "VULMON", "id": "CVE-2019-0008" }, { "db": "BID", "id": "107897" }, { "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "db": "NVD", "id": "CVE-2019-0008" }, { "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-10T00:00:00", "db": "VULHUB", "id": "VHN-140039" }, { "date": "2019-04-10T00:00:00", "db": "VULMON", "id": "CVE-2019-0008" }, { "date": "2019-04-10T00:00:00", "db": "BID", "id": "107897" }, { "date": "2019-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "date": "2019-04-10T20:29:00.380000", "db": "NVD", "id": "CVE-2019-0008" }, { "date": "2019-04-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-29T00:00:00", "db": "VULHUB", "id": "VHN-140039" }, { "date": "2021-10-25T00:00:00", "db": "VULMON", "id": "CVE-2019-0008" }, { "date": "2019-04-10T00:00:00", "db": "BID", "id": "107897" }, { "date": "2019-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003383" }, { "date": "2021-10-25T16:19:19.750000", "db": "NVD", "id": "CVE-2019-0008" }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-555" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Junos OS Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-555" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.