RSS   Podatności dla 'Junos evolved'   RSS

2021-01-15
 
CVE-2021-0211

CWE-754
 

 
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.

 
 
CVE-2021-0209

CWE-824
 

 
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS.

 
 
CVE-2021-0208

CWE-20
 

 
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the Denial of Service. This issue affects: Juniper Networks Junos OS: All versions prior to 17.3R3-S10 except 15.1X49-D240 for SRX series; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R3-S3; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 15.1X49 versions prior to 15.1X49-D240 on SRX Series. Juniper Networks Junos OS Evolved: 19.3 versions prior to 19.3R2-S5-EVO; 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S4-EVO.

 
2020-07-17
 
CVE-2020-1648

CWE-20
 

 
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; 19.4 versions 19.4R1 and 19.4R1-S1; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: 19.4-EVO versions prior to 19.4R2-S2-EVO; 20.1-EVO versions prior to 20.1R2-EVO. This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.

 
 
CVE-2020-1646

CWE-20
 

 
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for an IBGP peer. However, the offending BGP UPDATE can originally come from an EBGP peer, propagates through the network via IBGP peers without causing crash, then it causes RPD crash when it is processed for a BGP UPDATE towards an EBGP peer. Repeated receipt and processing of the same specific BGP UPDATE can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 17.3R3-S6, 17.4R2-S7, and 18.1R3-S7. Juniper Networks Junos OS Evolved 19.2R2-EVO and later versions, prior to 19.3R1-EVO. Other Junos OS releases are not affected.

 

 >>> Vendor: Juniper 101 Produkty
Netscreen screenos
Netscreen remote security client
Netscreen remote vpn client
Screenos
Junos
Netscreen-5gt
Netscreen-idp
Netscreen-idp 10
Netscreen-idp 100
Netscreen-idp 1000
Netscreen-idp 500
Junos e
Junos j
Junos m
Junos t
Junose e
Junose j
Junose m
Junose t
Netscreen-security manager 2004
Junose
Junipersetup control
DX
Http service
Session and resource control
Src pe
Secure access 2000
JNOS
Odyssey access client
IDP
Secure access
Networks mobility system software
Junos space
Junos space virtual appliance
Junos space ja1500 appliance
Smartpass
Junos pulse access control service
Junos pulse secure access service
Srx100
Srx110
Srx1400
Srx210
Srx220
Srx240
Srx3400
Srx3600
Srx550
Srx5600
Srx5800
Srx650
Secure access virtual appliance
Fips secure access 4000
Fips secure access 4500
Fips secure access 6000
Fips secure access 6500
Mag2600 gateway
Mag4610 gateway
Mag6610 gateway
Mag6611 gateway
Secure access 2500
Secure access 4000
Secure access 4500
Secure access 6000
Secure access 6500
Secure access 700
Ive os
Idp250
Idp75
Idp800
Idp8200
Netscreen-5200
Netscreen-5400
Network and security manager software
Nsm3000
Nsmexpress
Junos space ja2500 appliance
Fips infranet controller 6500
Infranet controller 4000
Infranet controller 4500
Infranet controller 6000
Infranet controller 6500
Unified access control software
Juniper installer service client
Junos pulse client
Mobile system software
Ringmaster
Pulse connect secure
Advanced threat protection
Northstar controller
Contrail
Trusted platform module firmware
Appformix
Libslax
Jsnapy
Junos os evolved
Virtual advanced threat protection
Junos evolved
Contrail networking
Paragon active assurance control center
Ctpview
Zobacz wszystkie produkty dla producenta Juniper


Copyright 2024, cxsecurity.com

 

Back to Top