CVE-2019-0051 – SRX5000 Series: Denial of Service vulnerability in SSL-Proxy feature.
https://notcve.org/view.php?id=CVE-2019-0051
SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protected by the SRX device must initiate a connection to the malicious server. This issue affects: Juniper Networks Junos OS on SRX5000 Series: 12.3X48 versions prior to 12.3X48-D85; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R2. La funcionalidad proxy SSL en dispositivos SRX no puede manejar una limitación de recursos de hardware que puede ser explotada por servidores SSL/TLS remotos para bloquear el demonio flowd. • https://kb.juniper.net/JSA10973 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2019-0050 – Junos OS: SRX1500: Denial of service due to crash of srxpfe process under heavy traffic conditions.
https://notcve.org/view.php?id=CVE-2019-0050
Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes of the srxpfe can result in an extended denial of service condition. The SRX device may fail to forward traffic when this condition occurs. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D170 on SRX1500; 17.3 versions prior to 17.3R3-S7 on SRX1500; 17.4 versions prior to 17.4R2-S8, 17.4R3 on SRX1500; 18.1 versions prior to 18.1R3-S8 on SRX1500; 18.2 versions prior to 18.2R3 on SRX1500; 18.3 versions prior to 18.3R2 on SRX1500; 18.4 versions prior to 18.4R2 on SRX1500. Bajo determinadas condiciones de tráfico pesado, el proceso srxpfe puede bloquearse y provocar una denegación de servicio para el dispositivo SRX1500. • https://kb.juniper.net/JSA10972 •
CVE-2019-0047 – Junos OS: Persistent XSS vulnerability in J-Web
https://notcve.org/view.php?id=CVE-2019-0047
A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web. This issue affects: Juniper Networks Junos OS 12.1X46 versions prior to 12.1X46-D86; 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D497, 15.1X53-D69; 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R1-S7, 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R3-S5; 18.2 versions prior to 18.2R1-S5, 18.2R2-S3, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2, 18.3R3; 18.4 versions prior to 18.4R1-S2, 18.4R2. Una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente en la interfaz J-Web de Junos OS puede permitir a atacantes remotos no autenticados realizar acciones administrativas en el dispositivo Junos. Un explotación con éxito requiere que un administrador de Junos realice primero determinadas acciones de diagnóstico en J-Web. • https://kb.juniper.net/JSA10970 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-1010232
https://notcve.org/view.php?id=CVE-2019-1010232
Juniper juniper/libslax libslax latest version (as of commit 084ddf6ab4a55b59dfa9a53f9c5f14d192c4f8e5 Commits on Sep 1, 2018) is affected by: Buffer Overflow. The impact is: remote dos. The component is: slaxlexer.c:601(funtion:slaxGetInput). The attack vector is: ./slaxproc --slax-to-xslt POC0. uniper/libslax libslax de Juniper última versión (a partir de commit 084ddf6ab4a55b59dfa9a53f9c5f14d192c4f8e5 Commits el 1 de septiembre de 2018) se ve afectada por: Desbordamiento de búfer. • https://bugzilla.redhat.com/show_bug.cgi?id=1649175 • CWE-787: Out-of-bounds Write •
CVE-2019-0053 – Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow
https://notcve.org/view.php?id=CVE-2019-0053
Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. • https://github.com/dreamsmasher/inetutils-CVE-2019-0053-Patched-PKGBUILD http://packetstormsecurity.com/files/153746/FreeBSD-Security-Advisory-FreeBSD-SA-19-12.telnet.html https://kb.juniper.net/JSA10947 https://lists.debian.org/debian-lts-announce/2022/11/msg00033.html https://lists.debian.org/debian-lts-announce/2023/10/msg00013.html https://seclists.org/bugtraq/2019/Jul/45 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:12.telnet.asc https://www.exploit-db.com/exploits/45982 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •