Page 55 of 302 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 103EXPL: 0

On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D60, 15.1X53 prior to 15.1X53-D30 and DHCPv6 enabled, when a crafted DHCPv6 packet is received from a subscriber, jdhcpd daemon crashes and restarts. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. En los productos o plataformas Juniper Networks que ejecutan Junos OS versiones 11.4 anteriores a 11.4R13-S3, 12.1X46 anteriores a 12.1X46-D60, 12.3 anteriores a 12.3R12-S2 o 12.3R13, 12.3X48 anteriores a 12.3X48-D40, 13.2X51 anteriores a 13.2X51-D40, 13.3 anteriores a 13.3R10, 14.1 anteriores a 14.1R8, 14.1X53 anteriores a 14.1X53-D12 o 14.1X53-D35, 14.1X55 anteriores a 14.1X55-D35, 14.2 anteriores a 14.2R7, 15.1 anteriores a 15.1F6 o 15.1R3, 15.1X49 anteriores a 15.1X49-D60, 15.1X53 anteriores a 15.1X53-D30 y además tiene habilitado DHCPv6, cuando un paquete DHCPv6 especialmente diseñado es recibido desde un suscriptor, el demonio jdhcpd se bloquea y se reinicia. Los bloqueos repetidos del proceso jdhcpd pueden constituir una condición extendida de denegación de servicio para los suscriptores que intentan obtener direcciones IPv6. • http://www.securityfocus.com/bid/95396 http://www.securitytracker.com/id/1037596 https://kb.juniper.net/JSA10769 •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability. En Switches EX Series Ethernet de Juniper Networks ejecutando las versiones afectadas del Junos OS, se detectó una vulnerabilidad en el procesamiento IPv6 que puede permitir que un paquete Neighbor Discovery (ND) de IPv6 especialmente diseñado destinado hacia un Switch EX Series Ethernet cause una pérdida de memoria lenta. Una inundación de paquetes maliciosos sobre la red de estos paquetes NDP de IPv6 diseñados puede eventualmente conllevar al agotamiento de recursos y a una denegación de servicio. • http://www.securityfocus.com/bid/97615 http://www.securitytracker.com/id/1038253 https://kb.juniper.net/JSA10781 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 6.8EPSS: 0%CPEs: 58EXPL: 0

On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process to crash and restart. It is not possible to free up the memory that has been consumed without restarting the rpd process. This issue affects Junos OS based devices with either IPv4 or IPv6 LDP enabled via the [protocols ldp] configuration (the native IPv6 support for LDP is available in Junos OS 16.1 and higher). The interface on which the packet arrives needs to have LDP enabled. • http://www.securityfocus.com/bid/97611 http://www.securitytracker.com/id/1038252 https://kb.juniper.net/JSA10777 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5, 15.1F7, 15.1R4-S7, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D78, 15.1X49-D80; 15.1X53 prior to 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4; 16.2 prior to 16.2R1-S3, 16.2R2; Releases prior to Junos OS 15.1 are unaffected by this vulnerability. 17.1R1, 17.2R1, and all subsequent releases have a resolution for this vulnerability. Dispositivos de Juniper Networks que ejecutan las versiones afectadas Junos OS pueden verse afectados por el recibo de una BGP UPDATE manipulada que puede conducir a un fallo y un reinicio del rpd (enrutamiento del daemon del proceso). Los repetidos bloqueos del daemon rpd pueden resultar en una condición extendida de denegación de servicio. • http://www.securityfocus.com/bid/97606 http://www.securitytracker.com/id/1038257 https://kb.juniper.net/JSA10778 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series routers can result in a PFE (Packet Forwarding Engine) hang or crash. En Juniper Networks Junos OS 15.1 en versiones desde la 15.1R3 a la 15.1R4, 16.1 anterior a 16.1R3, en plataformas M/MX donde se configura Enhanced Subscriber Management para suscriptores DHCPv6, una vulnerabilidad en el procesamiento de paquetes IPv6 ND originados de suscriptores y destinados a los enrutadores de las series M/MX puede ocasionar un cuelgue o una caída de PFE (Packet Forwarding Engine). • http://www.securityfocus.com/bid/97607 http://www.securitytracker.com/id/1038254 https://kb.juniper.net/JSA10786 • CWE-20: Improper Input Validation •