
CVE-2016-4924 – vMX: Information leak vulnerability
https://notcve.org/view.php?id=CVE-2016-4924
13 Oct 2017 — An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos O... • http://www.securityfocus.com/bid/93531 • CWE-275: Permission Issues •

CVE-2017-10607 – Junos: rpd core due to receipt of specially crafted BGP packet
https://notcve.org/view.php?id=CVE-2017-10607
13 Oct 2017 — Juniper Networks Junos OS 16.1R1, and services releases based off of 16.1R1, are vulnerable to the receipt of a crafted BGP Protocol Data Unit (PDU) sent directly to the router, which can cause the RPD routing process to crash and restart. Unlike BGP UPDATEs, which are transitive in nature, this issue can only be triggered by a packet sent directly to the IP address of the router. Repeated crashes of the rpd daemon can result in an extended denial of service condition. This issue only affects devices runnin... • https://kb.juniper.net/JSA10810 •

CVE-2017-10608 – SRX series: Junos OS: SRX series using IPv6 Sun/MS-RPC ALGs may experience flowd crash on processing packets.
https://notcve.org/view.php?id=CVE-2017-10608
13 Oct 2017 — Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected... • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-10610 – SRX Series: Embedded ICMP may cause the flowd process to crash
https://notcve.org/view.php?id=CVE-2017-10610
13 Oct 2017 — On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is configured. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D71, 12.3X48 prior to 12.3X48-D55, 15.1X49 prior to 15.1X49-D100 on SRX Series. No other Juniper Networks products or platforms are affected by this... • https://kb.juniper.net/JSA10813 • CWE-20: Improper Input Validation •

CVE-2017-10611 – Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled
https://notcve.org/view.php?id=CVE-2017-10611
13 Oct 2017 — If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if 'extended-statistics' are enabled under th... • https://kb.juniper.net/JSA10814 •

CVE-2017-10613 – Junos OS: A kernel hang may occur due to a specific loopback filter action command
https://notcve.org/view.php?id=CVE-2017-10613
13 Oct 2017 — A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with the defined action, to hang the kernel. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D55; 12.3X48 prior to 12.3X48-D35; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D40; 14.2 prior to 14.2R4... • https://kb.juniper.net/JSA10816 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-10614 – Junos OS: A remote unauthenticated attacker can consume large amounts of CPU and/or memory through telnetd
https://notcve.org/view.php?id=CVE-2017-10614
13 Oct 2017 — A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D45; 12.3X48 prior to 12.3X48-D30; 14.1 prior to 14.1R4-S9, 14.1R8; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D232, 15.1X53-D47. Un vulnerabilidad en el servicio te... • https://kb.juniper.net/JSA10817 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-10615 – Junos: Potential remote code execution vulnerability in PAM
https://notcve.org/view.php?id=CVE-2017-10615
13 Oct 2017 — A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affected Juniper Networks Junos OS releases are: 14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D50 on EX and QFX series; 14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8; No other Junos OS releases are affected by this issue. No other Juniper Network... • http://www.securitytracker.com/id/1040039 • CWE-20: Improper Input Validation •

CVE-2017-10618 – Junos: RPD core due to BGP UPDATE with malformed optional transitive attributes
https://notcve.org/view.php?id=CVE-2017-10618
13 Oct 2017 — When the 'bgp-error-tolerance' feature â" designed to help mitigate remote session resets from malformed path attributes â" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X5... • https://kb.juniper.net/JSA10820 •

CVE-2017-10619 – Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets
https://notcve.org/view.php?id=CVE-2017-10619
13 Oct 2017 — When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled b... • https://kb.juniper.net/JSA10821 •