Page 23 of 164 results (0.011 seconds)

CVSS: 8.4EPSS: 0%CPEs: 149EXPL: 0

Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X46 prior to 12.1X46-D60; 12.1X47 prior to 12.1X47-D45; 12.3 prior to 12.3R12; 12.3X48 prior to 12.3X48-D35; 13.2 prior to 13.2R9; 13.3 prior to 13.3R4-S11, 13.3R9; 14.1 prior to 14.1R4-S12, 14.1R7; 14.1X53 prior to 14.1X53-D28, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R5; 15.1 prior to 15.1F4, 15.1R3; 15.1X49 prior to 15.1X49-D60; 15.1X53 prior to 15.1X53-D57, 15.1X53-D70. Se encontraron algunas combinaciones de argumentos y comandos CLI de Junos OS explotables de una manera que permite el acceso no autorizado al sistema operativo. Esto puede permitir que cualquier usuario con permisos para ejecutar estos comandos CLI tenga la capacidad para conseguir privilegios elevados y obtener el control total del dispositivo. • http://www.securityfocus.com/bid/93534 http://www.securitytracker.com/id/1037013 https://kb.juniper.net/JSA10763 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

On Juniper Networks SRX Series Services Gateways chassis clusters running Junos OS 12.1X46 prior to 12.1X46-D65, 12.3X48 prior to 12.3X48-D40, 12.3X48 prior to 12.3X48-D60, flowd daemon on the primary node of an SRX Series chassis cluster may crash and restart when attempting to synchronize a multicast session created via crafted multicast packets. En los clústeres de tipo chassis de dispositivos Juniper Networks SRX Series Services Gateways que ejecutan el sistema operativo versiones: Junos 12.1X46 anterior a 12.1X46-D65, 12.3X48 anterior a 12.3X48-D40 y12.3X48 anterior a 12.3X48-D60, el demonio flowd en el nodo principal del clúster, puede bloquearse y reiniciarse al intentar sincronizar una sesión multicast creada mediante paquetes multicast especialmente diseñados. • http://www.securityfocus.com/bid/95400 http://www.securitytracker.com/id/1037597 https://kb.juniper.net/JSA10768 •

CVSS: 7.8EPSS: 0%CPEs: 103EXPL: 0

On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D60, 15.1X53 prior to 15.1X53-D30 and DHCPv6 enabled, when a crafted DHCPv6 packet is received from a subscriber, jdhcpd daemon crashes and restarts. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. En los productos o plataformas Juniper Networks que ejecutan Junos OS versiones 11.4 anteriores a 11.4R13-S3, 12.1X46 anteriores a 12.1X46-D60, 12.3 anteriores a 12.3R12-S2 o 12.3R13, 12.3X48 anteriores a 12.3X48-D40, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D12 o 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R7, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D60, 15.1X53 anteriores a 15.1X53-D30 y además tiene habilitado DHCPv6, cuando un paquete DHCPv6 especialmente diseñado es recibido desde un suscriptor, el demonio jdhcpd se bloquea y se reinicia. Los bloqueos repetidos del proceso jdhcpd pueden constituir una condición extendida de denegación de servicio para los suscriptores que intentan obtener direcciones IPv6. • http://www.securityfocus.com/bid/95396 http://www.securitytracker.com/id/1037596 https://kb.juniper.net/JSA10769 •

CVSS: 7.1EPSS: 0%CPEs: 53EXPL: 0

Juniper Junos OS before 12.1X46-D50, 12.1X47 before 12.1X47-D40, 12.3X48 before 12.3X48-D30, 13.3 before 13.3R9, 14.1 before 14.1R8, 14.1X53 before 14.1X53-D40, 14.2 before 14.2R6, 15.1 before 15.1F6 or 15.1R3, and 15.1X49 before 15.1X49-D40, when configured with a GRE or IPIP tunnel, allow remote attackers to cause a denial of service (kernel panic) via a crafted ICMP packet. Juniper Junos OS en versiones anteriores a 12.1X46-D50, 12.1X47 en versiones anteriores a 12.1X47-D40, 12.3X48 en versiones anteriores a 12.3X48-D30, 13.3 en versiones anteriores a 13.3R9, 14.1 en versiones anteriores a 14.1R8, 14.1X53 en versiones anteriores a 14.1X53-D40, 14.2 en versiones anteriores a 14.2R6, 15.1 en versiones anteriores a 15.1F6 o 15.1R3 y 15.1X49 en versiones anteriores a 15.1X49-D40, cuando es configurado con un tunel GRE o IPIP, permiten a atacantes remotos provocar una denegación de servicio (pánico en el kernel) a través de un paquete ICMP manipulado. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752 http://www.securityfocus.com/bid/91755 http://www.securitytracker.com/id/1036306 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 64EXPL: 0

J-Web in Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3 before 12.3R12, 12.3X48 before 12.3X48-D25, 13.3 before 13.3R10, 13.3R9 before 13.3R9-S1, 14.1 before 14.1R7, 14.1X53 before 14.1X53-D35, 14.2 before 14.2R6, 15.1 before 15.1A2 or 15.1F4, 15.1X49 before 15.1X49-D30, and 15.1R before 15.1R3 might allow remote attackers to obtain sensitive information and consequently gain administrative privileges via unspecified vectors. J-Web en Juniper Junos OS en versiones anteriores a 12.1X46-D45, 12.1X46-D50, 12.1X47 en versiones anteriores a 12.1X47-D35, 12.3 en versiones anteriores a 12.3R12, 12.3X48 en versiones anteriores a 12.3X48-D25, 13.3 en versiones anteriores a 13.3R10, 13.3R9 en versiones anteriores a 13.3R9-S1, 14.1 en versiones anteriores a 14.1R7, 14.1X53 en versiones anteriores a 14.1X53-D35, 14.2 en versiones anteriores a 14.2R6, 15.1 en versiones anteriores a 15.1A2 o 15.1F4, 15.1X49 en versiones anteriores a 15.1X49-D30 y 15.1R en versiones anteriores a 15.1R3 podría permitir a atacantes remotos obtener información sensible y por lo tanto conseguir privilegios administrativos a través de vectores no especificados. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10754 http://www.securityfocus.com/bid/91759 http://www.securitytracker.com/id/1036302 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •