CVE-2017-10613 – Junos OS: A kernel hang may occur due to a specific loopback filter action command
https://notcve.org/view.php?id=CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with the defined action, to hang the kernel. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D55; 12.3X48 prior to 12.3X48-D35; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D40; 14.2 prior to 14.2R4-S9, 14.2R7-S8, 14.2R8; 15.1 prior to 15.1F5-S3, 15.1F6, 15.1R4; 15.1X49 prior to 15.1X49-D60; 15.1X53 prior to 15.1X53-D47; 16.1 prior to 16.1R2. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad en un comando de acción de filtro de loopback específico, procesado en un orden lógico específico de operación, en un configuración activa en Juniper Networks Junos OS, permite que un atacante con acceso CLI y la capacidad para iniciar sesiones remotas a la interfaz loopback con la acción definida cuelgue el kernel. Las distribuciones afectadas son: Juniper Networks Junos OS 12.1X46 anteriores a 12.1X46-D55; 12.3X48 anteriores a 12.3X48-D35; 14.1 anteriores a 14.1R8-S4, 14.1R9; 14.1X53 anteriores a 14.1X53-D40; 14.2 anteriores a 14.2R4-S9, 14.2R7-S8, 14.2R8; 15.1 anteriores a 15.1F5-S3, 15.1F6, 15.1R4; 15.1X49 anteriores a 15.1X49-D60; 15.1X53 anteriores a 15.1X53-D47; 16.1 anteriores a 16.1R2. • https://kb.juniper.net/JSA10816 • CWE-400: Uncontrolled Resource Consumption •
CVE-2017-10611 – Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled
https://notcve.org/view.php?id=CVE-2017-10611
If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if 'extended-statistics' are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue. • https://kb.juniper.net/JSA10814 •
CVE-2017-2341 – Junos OS: VM to host privilege escalation in platforms with Junos OS running in a virtualized environment.
https://notcve.org/view.php?id=CVE-2017-2341
An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D40 on QFX5110, QFX5200, QFX10002, QFX10008, QFX10016, EX4600 and NFX250; 15.1 prior to 15.1R5 on EX4600; 15.1X49 prior to 15.1X49-D70 on vSRX, SRX1500, SRX4100, SRX4200; 16.1 prior to 16.1R2 on EX4600, ACX5000 series. This issue does not affect vMX. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad de autenticación insuficiente en plataformas donde las instancias de Junos OS se ejecutan en un entorno virtualizado, puede permitir que los usuarios sin privilegios de la instancia de Junos OS alcanzar acceso al entorno operativo del host y, por lo tanto, escalar los privilegios. • http://www.securitytracker.com/id/1038893 https://kb.juniper.net/JSA10787 • CWE-287: Improper Authentication •
CVE-2017-2345 – Junos: snmpd denial of service upon receipt of crafted SNMP packet
https://notcve.org/view.php?id=CVE-2017-2345
On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Additionally, it may be possible to craft a malicious SNMP packet in a way that can result in remote code execution. SNMP is disabled in Junos OS by default. Junos OS devices with SNMP disabled are not affected by this issue. • http://www.securityfocus.com/bid/99567 http://www.securitytracker.com/id/1038903 https://kb.juniper.net/JSA10793 • CWE-20: Improper Input Validation •
CVE-2017-2346 – MS-MPC or MS-MIC crash when passing large fragmented traffic through an ALG
https://notcve.org/view.php?id=CVE-2017-2346
An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1182910 in Junos OS 14.1X55-D30, 14.1X55-D35, 14.2R7, 15.1R5, and 16.1R2. No other versions of Junos OS and no other Juniper Networks products or platforms are affected by this issue. • http://www.securitytracker.com/id/1038895 https://kb.juniper.net/JSA10794 •