Page 42 of 258 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 96EXPL: 0

A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affected releases are Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55; 13.3 prior to 13.3R10; 14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9; 14.1X53 prior to 14.1X53-D42, 14.1X53-D50; 14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D105, 15.1X53-D47, 15.1X53-D62, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad de denegación de servicio en el demonio rpd de Juniper Networks Junos OS, permite que un paquete de ping MPLS malformado bloquee el demonio rpd si MPLS OAM está configurado. • http://www.securityfocus.com/bid/100236 http://www.securitytracker.com/id/1038892 https://kb.juniper.net/JSA10795 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 96EXPL: 0

On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3 prior to 12.3R13, 12.3X48 prior to 12.3X48-D30, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R5, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D30 or 15.1X49-D40, 15.1X53 prior to 15.1X53-D35, and where RIP is enabled, certain RIP advertisements received by the router may cause the RPD daemon to crash resulting in a denial of service condition. En productos o plataformas Juniper Networks que ejecutan Junos OS 12.1X46 anteriores a 12.1X46-D50, 12.1X47 anteriores a 12.1X47-D40, 12.3 anteriores a 12.3R13, 12.3X48 anteriores a 12.3X48-D30, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R5, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D30 o 15.1X49-D40, 15.1X53 anteriores a 15.1X53-D35, y donde RIP está habilitado, ciertos anuncios RIP recibidos por el router pueden causar que el demonio de RPD se bloquee resultando en una condición de denegación de servicio. • http://www.securityfocus.com/bid/95408 http://www.securitytracker.com/id/1037594 https://kb.juniper.net/JSA10772 •

CVSS: 7.8EPSS: 0%CPEs: 71EXPL: 0

On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 prior to 12.1X47-D45, 12.3R13 prior to 12.3R13, 12.3X48 prior to 12.3X48-D35, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R6, 15.1 prior to 15.1F2 or 15.1R1, 15.1X49 prior to 15.1X49-D20 where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. En productos o plataformas Juniper Networks que ejecutan Junos OS 12.1X46 anteriores a 12.1X46-D55, 12.1X47 anteriores a 12.1X47-D45, 12.3R13 anteriores a 12.3R13, 12.3X48 anteriores a 12.3X48-D35, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D40, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R6, 15.1 anteriores a 15.1F2 oO 15.1R1, 15.1X49 anteriores a 15.1X49-D20, donde la funcionalidad BGP add-path está habilitada con la opción 'send' o con las opciones 'enviar' y 'recibir', un atacante en la red puede causar que el demonio rpd de Junos OS se bloquee y se reinicie. Los repetidos bloqueos del demonio rpd pueden resultar en una condición extendida de denegación de servicio. • http://www.securityfocus.com/bid/95394 http://www.securitytracker.com/id/1037595 https://kb.juniper.net/JSA10771 •

CVSS: 7.8EPSS: 0%CPEs: 103EXPL: 0

On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D60, 15.1X53 prior to 15.1X53-D30 and DHCPv6 enabled, when a crafted DHCPv6 packet is received from a subscriber, jdhcpd daemon crashes and restarts. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. En los productos o plataformas Juniper Networks que ejecutan Junos OS versiones 11.4 anteriores a 11.4R13-S3, 12.1X46 anteriores a 12.1X46-D60, 12.3 anteriores a 12.3R12-S2 o 12.3R13, 12.3X48 anteriores a 12.3X48-D40, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D12 o 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R7, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D60, 15.1X53 anteriores a 15.1X53-D30 y además tiene habilitado DHCPv6, cuando un paquete DHCPv6 especialmente diseñado es recibido desde un suscriptor, el demonio jdhcpd se bloquea y se reinicia. Los bloqueos repetidos del proceso jdhcpd pueden constituir una condición extendida de denegación de servicio para los suscriptores que intentan obtener direcciones IPv6. • http://www.securityfocus.com/bid/95396 http://www.securitytracker.com/id/1037596 https://kb.juniper.net/JSA10769 •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability. En Switches EX Series Ethernet de Juniper Networks ejecutando las versiones afectadas del Junos OS, se detectó una vulnerabilidad en el procesamiento IPv6 que puede permitir que un paquete Neighbor Discovery (ND) de IPv6 especialmente diseñado destinado hacia un Switch EX Series Ethernet cause una pérdida de memoria lenta. Una inundación de paquetes maliciosos sobre la red de estos paquetes NDP de IPv6 diseñados puede eventualmente conllevar al agotamiento de recursos y a una denegación de servicio. • http://www.securityfocus.com/bid/97615 http://www.securitytracker.com/id/1038253 https://kb.juniper.net/JSA10781 • CWE-772: Missing Release of Resource after Effective Lifetime •