Page 55 of 302 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 25EXPL: 0

Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak' Los dispositivos QFX3500, QFX3600, QFX5100, QFX5200, EX4300 y EX4600 de Juniper Networks que ejecutan Junos OS 14.1X53 anteriores a 14.1X53-D40, 15.1X53 anteriores a 15.1X53-D40 y 15.1 anteriores a 15.1R2, no rellenan paquetes Ethernet con ceros por lo que algunos paquetes pueden contener fragmentos de memoria del sistema o datos de paquetes anteriores. Este problema también es conocido como "Etherleak" • http://www.securityfocus.com/bid/95403 http://www.securitytracker.com/id/1037593 https://kb.juniper.net/JSA10773 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 58EXPL: 0

On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process to crash and restart. It is not possible to free up the memory that has been consumed without restarting the rpd process. This issue affects Junos OS based devices with either IPv4 or IPv6 LDP enabled via the [protocols ldp] configuration (the native IPv6 support for LDP is available in Junos OS 16.1 and higher). The interface on which the packet arrives needs to have LDP enabled. • http://www.securityfocus.com/bid/97611 http://www.securitytracker.com/id/1038252 https://kb.juniper.net/JSA10777 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability. En Switches EX Series Ethernet de Juniper Networks ejecutando las versiones afectadas del Junos OS, se detectó una vulnerabilidad en el procesamiento IPv6 que puede permitir que un paquete Neighbor Discovery (ND) de IPv6 especialmente diseñado destinado hacia un Switch EX Series Ethernet cause una pérdida de memoria lenta. Una inundación de paquetes maliciosos sobre la red de estos paquetes NDP de IPv6 diseñados puede eventualmente conllevar al agotamiento de recursos y a una denegación de servicio. • http://www.securityfocus.com/bid/97615 http://www.securitytracker.com/id/1038253 https://kb.juniper.net/JSA10781 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5, 15.1F7, 15.1R4-S7, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D78, 15.1X49-D80; 15.1X53 prior to 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4; 16.2 prior to 16.2R1-S3, 16.2R2; Releases prior to Junos OS 15.1 are unaffected by this vulnerability. 17.1R1, 17.2R1, and all subsequent releases have a resolution for this vulnerability. Dispositivos de Juniper Networks que ejecutan las versiones afectadas Junos OS pueden verse afectados por el recibo de una BGP UPDATE manipulada que puede conducir a un fallo y un reinicio del rpd (enrutamiento del daemon del proceso). Los repetidos bloqueos del daemon rpd pueden resultar en una condición extendida de denegación de servicio. • http://www.securityfocus.com/bid/97606 http://www.securitytracker.com/id/1038257 https://kb.juniper.net/JSA10778 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series routers can result in a PFE (Packet Forwarding Engine) hang or crash. En Juniper Networks Junos OS 15.1 en versiones desde la 15.1R3 a la 15.1R4, 16.1 anterior a 16.1R3, en plataformas M/MX donde se configura Enhanced Subscriber Management para suscriptores DHCPv6, una vulnerabilidad en el procesamiento de paquetes IPv6 ND originados de suscriptores y destinados a los enrutadores de las series M/MX puede ocasionar un cuelgue o una caída de PFE (Packet Forwarding Engine). • http://www.securityfocus.com/bid/97607 http://www.securitytracker.com/id/1038254 https://kb.juniper.net/JSA10786 • CWE-20: Improper Input Validation •