Lucene search

K
JuniperJunos12.3x48

16 matches found

CVE
CVE
added 2019/04/10 8:29 p.m.159 views

CVE-2019-0044

Receipt of a specific packet on the out-of-band management interface fxp0 may cause the system to crash and restart (vmcore). By continuously sending a specially crafted packet to the fxp0 interface, an attacker can repetitively crash the rpd process causing prolonged Denial of Service (DoS). Affec...

7.5CVSS7.5AI score0.00566EPSS
CVE
CVE
added 2019/07/11 8:15 p.m.153 views

CVE-2019-0053

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the...

7.8CVSS7.7AI score0.00077EPSS
CVE
CVE
added 2019/07/11 8:15 p.m.144 views

CVE-2019-0052

The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Filtering and have web...

7.8CVSS7.5AI score0.00353EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.67 views

CVE-2019-0055

A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing ...

7.5CVSS7.5AI score0.00408EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.62 views

CVE-2019-0075

A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected releas...

7.5CVSS7.6AI score0.00389EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.59 views

CVE-2019-0003

When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. Affected...

7.5CVSS6AI score0.00803EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.58 views

CVE-2019-0068

The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Ne...

7.5CVSS7AI score0.00277EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.55 views

CVE-2019-0058

A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue af...

7.8CVSS7.8AI score0.00039EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.52 views

CVE-2019-0010

An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which ...

7.5CVSS7.7AI score0.01114EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0012

A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an attacker to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extende...

7.5CVSS7.5AI score0.00406EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0013

The routing protocol daemon (RPD) process will crash and restart when a specific invalid IPv4 PIM Join packet is received. While RPD restarts after a crash, repeated crashes can result in an extended Denial of Service (DoS) condition. This issue only affects IPv4 PIM. IPv6 PIM is unaffected by this...

7.5CVSS6.9AI score0.00308EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.43 views

CVE-2019-0051

SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protected by the S...

7.5CVSS6.9AI score0.00236EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.43 views

CVE-2019-0062

A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R1...

8.8CVSS8.2AI score0.00357EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.42 views

CVE-2019-0043

In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker can repetitively crash the RPD process causing prolonged denial of service. No other Juniper Network...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.40 views

CVE-2019-0015

A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted us...

5.5CVSS5.5AI score0.00193EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.40 views

CVE-2019-0047

A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web. This issue...

8.8CVSS7.8AI score0.00646EPSS