Page 43 of 260 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 53EXPL: 0

A specific device configuration can result in a commit failure condition. When this occurs, a user is logged in without being prompted for a password while trying to login through console, ssh, ftp, telnet or su, etc., This issue relies upon a device configuration precondition to occur. Typically, device configurations are the result of a trusted administrative change to the system's running configuration. The following error messages may be seen when this failure occurs: mgd: error: commit failed: (statements constraint check failed) Warning: Commit failed, activating partial configuration. Warning: Edit the router configuration to fix these errors. • http://www.securitytracker.com/id/1038902 https://kb.juniper.net/JSA10802 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 96EXPL: 0

A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affected releases are Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55; 13.3 prior to 13.3R10; 14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9; 14.1X53 prior to 14.1X53-D42, 14.1X53-D50; 14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D105, 15.1X53-D47, 15.1X53-D62, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad de denegación de servicio en el demonio rpd de Juniper Networks Junos OS, permite que un paquete de ping MPLS malformado bloquee el demonio rpd si MPLS OAM está configurado. • http://www.securityfocus.com/bid/100236 http://www.securitytracker.com/id/1038892 https://kb.juniper.net/JSA10795 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 96EXPL: 0

On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3 prior to 12.3R13, 12.3X48 prior to 12.3X48-D30, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R5, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D30 or 15.1X49-D40, 15.1X53 prior to 15.1X53-D35, and where RIP is enabled, certain RIP advertisements received by the router may cause the RPD daemon to crash resulting in a denial of service condition. En productos o plataformas Juniper Networks que ejecutan Junos OS 12.1X46 anteriores a 12.1X46-D50, 12.1X47 anteriores a 12.1X47-D40, 12.3 anteriores a 12.3R13, 12.3X48 anteriores a 12.3X48-D30, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R5, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D30 o 15.1X49-D40, 15.1X53 anteriores a 15.1X53-D35, y donde RIP está habilitado, ciertos anuncios RIP recibidos por el router pueden causar que el demonio de RPD se bloquee resultando en una condición de denegación de servicio. • http://www.securityfocus.com/bid/95408 http://www.securitytracker.com/id/1037594 https://kb.juniper.net/JSA10772 •

CVSS: 7.8EPSS: 0%CPEs: 71EXPL: 0

On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 prior to 12.1X47-D45, 12.3R13 prior to 12.3R13, 12.3X48 prior to 12.3X48-D35, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R6, 15.1 prior to 15.1F2 or 15.1R1, 15.1X49 prior to 15.1X49-D20 where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. En productos o plataformas Juniper Networks que ejecutan Junos OS 12.1X46 anteriores a 12.1X46-D55, 12.1X47 anteriores a 12.1X47-D45, 12.3R13 anteriores a 12.3R13, 12.3X48 anteriores a 12.3X48-D35, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D40, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R6, 15.1 anteriores a 15.1F2 oO 15.1R1, 15.1X49 anteriores a 15.1X49-D20, donde la funcionalidad BGP add-path está habilitada con la opción 'send' o con las opciones 'enviar' y 'recibir', un atacante en la red puede causar que el demonio rpd de Junos OS se bloquee y se reinicie. Los repetidos bloqueos del demonio rpd pueden resultar en una condición extendida de denegación de servicio. • http://www.securityfocus.com/bid/95394 http://www.securitytracker.com/id/1037595 https://kb.juniper.net/JSA10771 •

CVSS: 7.8EPSS: 0%CPEs: 103EXPL: 0

On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D60, 15.1X53 prior to 15.1X53-D30 and DHCPv6 enabled, when a crafted DHCPv6 packet is received from a subscriber, jdhcpd daemon crashes and restarts. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. En los productos o plataformas Juniper Networks que ejecutan Junos OS versiones 11.4 anteriores a 11.4R13-S3, 12.1X46 anteriores a 12.1X46-D60, 12.3 anteriores a 12.3R12-S2 o 12.3R13, 12.3X48 anteriores a 12.3X48-D40, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D12 o 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R7, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D60, 15.1X53 anteriores a 15.1X53-D30 y además tiene habilitado DHCPv6, cuando un paquete DHCPv6 especialmente diseñado es recibido desde un suscriptor, el demonio jdhcpd se bloquea y se reinicia. Los bloqueos repetidos del proceso jdhcpd pueden constituir una condición extendida de denegación de servicio para los suscriptores que intentan obtener direcciones IPv6. • http://www.securityfocus.com/bid/95396 http://www.securitytracker.com/id/1037596 https://kb.juniper.net/JSA10769 •