4 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 359EXPL: 0

When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. • https://kb.juniper.net/JSA11191 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in the Juniper Networks NetScreen Firewall products with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via vectors related to a DNS lookup. Vulnerabilidad no especificada en los productos de Juniper Networks NetScreen Firewall con ScreenOS anterior a 6.3r17, cuando está configurado para utilizar el cliente de búsqueda DNS interno, permite a atacantes remotos causar una denegación de servicio (caída y reinicio) a través de vectores relacionados con una búsqueda DNS. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10631 http://secunia.com/advisories/59026 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP. Los dispositivos Juniper Networks NetScreen Firewall con ScreenOS anterior a 6.3r17, cuando configurados para utilizar el cliente de búsqueda DNS interno, permite a atacantes remotos causar una denegación de servicio (caída y reinicio) a través de una secuencia de paquetes malformados en el IP del dispositivo. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632 http://secunia.com/advisories/59026 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 1%CPEs: 5EXPL: 0

Juniper NetScreen Firewall running ScreenOS 5.4, 6.2, or 6.3, when the Ping of Death screen is disabled, allows remote attackers to cause a denial of service via a crafted packet. Juniper NetScreen Firewall corriendo ScreenOS 5.4, 6.2 o 6.3, cuando la pantalla Ping of Dead está deshabilitada, permite a atacantes remotos causar una denegación de servico a través de un paquete manipulado. • http://jvn.jp/en/jp/JVN28436508/index.html http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000119.html http://osvdb.org/100861 http://www.securitytracker.com/id/1029490 https://kb.juniper.net/JSA10604 •