Lucene search

K
cvelistJuniperCVELIST:CVE-2023-44178
HistoryOct 12, 2023 - 11:01 p.m.

CVE-2023-44178 Junos OS : Stack overflow vulnerability in CLI command processing

2023-10-1223:01:04
CWE-121
CWE-787
juniper
www.cve.org
juniper networks
buffer overflow
denial of service
security advisory

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%

A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.

Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.

This issue affects Juniper Networks:

Junos OS

  • All versions prior to 19.1R3-S10;
  • 19.2 versions prior to 19.2R3-S7;
  • 19.3 versions prior to 19.3R3-S8;
  • 19.4 versions prior to 19.4R3-S12;
  • 20.2 versions prior to 20.2R3-S8;
  • 20.4 versions prior to 20.4R3-S8;
  • 21.2 versions prior to 21.2R3-S6;
  • 21.3 versions prior to 21.3R3-S5;
  • 21.4 versions prior to 21.4R3-S5;
  • 22.1 versions prior to 22.1R3-S3;
  • 22.2 versions prior to 22.2R3-S2;
  • 22.3 versions prior to 22.3R3-S1;
  • 22.4 versions prior to 22.4R2-S1;
  • 23.2 versions prior to 23.2R2.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "19.1R3-S10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "19.2R3-S7",
        "status": "affected",
        "version": "19.2",
        "versionType": "semver"
      },
      {
        "lessThan": "19.3R3-S8",
        "status": "affected",
        "version": "19.3",
        "versionType": "semver"
      },
      {
        "lessThan": "19.4R3-S12",
        "status": "affected",
        "version": "19.4",
        "versionType": "semver"
      },
      {
        "lessThan": "20.2R3-S8",
        "status": "affected",
        "version": "20.2",
        "versionType": "semver"
      },
      {
        "lessThan": "20.4R3-S8",
        "status": "affected",
        "version": "20.4",
        "versionType": "semver"
      },
      {
        "lessThan": "21.2R3-S6",
        "status": "affected",
        "version": "21.2",
        "versionType": "semver"
      },
      {
        "lessThan": "21.3R3-S5",
        "status": "affected",
        "version": "21.3",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4R3-S5",
        "status": "affected",
        "version": "21.4",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R3-S3",
        "status": "affected",
        "version": "22.1",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3-S2",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R3-S1",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R2-S1",
        "status": "affected",
        "version": "22.4",
        "versionType": "semver"
      },
      {
        "lessThan": "23.2R2",
        "status": "affected",
        "version": "23.2",
        "versionType": "semver"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2023-44178