Page 43 of 260 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 72EXPL: 0

A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with the defined action, to hang the kernel. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D55; 12.3X48 prior to 12.3X48-D35; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D40; 14.2 prior to 14.2R4-S9, 14.2R7-S8, 14.2R8; 15.1 prior to 15.1F5-S3, 15.1F6, 15.1R4; 15.1X49 prior to 15.1X49-D60; 15.1X53 prior to 15.1X53-D47; 16.1 prior to 16.1R2. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad en un comando de acción de filtro de loopback específico, procesado en un orden lógico específico de operación, en un configuración activa en Juniper Networks Junos OS, permite que un atacante con acceso CLI y la capacidad para iniciar sesiones remotas a la interfaz loopback con la acción definida cuelgue el kernel. Las distribuciones afectadas son: Juniper Networks Junos OS 12.1X46 anteriores a 12.1X46-D55; 12.3X48 anteriores a 12.3X48-D35; 14.1 anteriores a 14.1R8-S4, 14.1R9; 14.1X53 anteriores a 14.1X53-D40; 14.2 anteriores a 14.2R4-S9, 14.2R7-S8, 14.2R8; 15.1 anteriores a 15.1F5-S3, 15.1F6, 15.1R4; 15.1X49 anteriores a 15.1X49-D60; 15.1X53 anteriores a 15.1X53-D47; 16.1 anteriores a 16.1R2. • https://kb.juniper.net/JSA10816 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 0%CPEs: 174EXPL: 0

If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if 'extended-statistics' are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue. • https://kb.juniper.net/JSA10814 •

CVSS: 8.4EPSS: 0%CPEs: 149EXPL: 0

Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X46 prior to 12.1X46-D60; 12.1X47 prior to 12.1X47-D45; 12.3 prior to 12.3R12; 12.3X48 prior to 12.3X48-D35; 13.2 prior to 13.2R9; 13.3 prior to 13.3R4-S11, 13.3R9; 14.1 prior to 14.1R4-S12, 14.1R7; 14.1X53 prior to 14.1X53-D28, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R5; 15.1 prior to 15.1F4, 15.1R3; 15.1X49 prior to 15.1X49-D60; 15.1X53 prior to 15.1X53-D57, 15.1X53-D70. Se encontraron algunas combinaciones de argumentos y comandos CLI de Junos OS explotables de una manera que permite el acceso no autorizado al sistema operativo. Esto puede permitir que cualquier usuario con permisos para ejecutar estos comandos CLI tenga la capacidad para conseguir privilegios elevados y obtener el control total del dispositivo. • http://www.securityfocus.com/bid/93534 http://www.securitytracker.com/id/1037013 https://kb.juniper.net/JSA10763 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 80EXPL: 0

Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected. • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.9EPSS: 0%CPEs: 35EXPL: 0

A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D50; 12.1X47 prior to 12.1X47-D30, 12.1X47-D35; 12.3X48 prior to 12.3X48-D20, 12.3X48-D30; 15.1X49 prior to 15.1X49-D20, 15.1X49-D30. Una vulnerabilidad de inyección de comandos en la función IDP de Juniper Networks Junos OS en dispositivos de la serie SRX potencialmente permite a un usuario con acceso de inicio de sesión al dispositivo ejecutar comandos shell y elevar privilegios. Las versiones afectadas son Juniper Networks Junos OS versión 12.1X44 anterior a 12.1X44-D60; versión 12.1X46 anterior a 12.1X46-D50; versión 12.1X47 anterior a 12.1X47-D30, 12.1X47-D35; versión 12.3X48 anterior a 12.3X48-D20, 12.3X48-D30; versión 15.1X49 anterior a 15.1X49-D20, 15.1X49-D30. • http://www.securitytracker.com/id/1038898 https://kb.juniper.net/JSA10801 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •