Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3818

EPSS 0.49% · P66
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-3818

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Juniper Junos OS 拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Juniper Junos OS中存在安全漏洞。当程序支持4字节AS号而BGP peer不支持时,远程攻击者可借助BGP UPDATE中特制的传递属性利用该漏洞造成拒绝服务(内存损坏,RDP路由器进程崩溃并重启)。以下版本受到影响:Juniper Junos OS 9.1版本至11.4R11之
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-3818

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-3818

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-10-14 · 11 CVEs total

CVE-2014-3825Juniper Networks Juniper SRX Series devices with Junos 拒绝服务漏洞
CVE-2014-6313WordPress WooCommerce‘rang’参数跨站脚本漏洞
CVE-2014-6377Juniper Networks Juniper JunosE 拒绝服务漏洞
CVE-2014-6378Juniper Networks Juniper Junos 拒绝服务漏洞
CVE-2014-6379Juniper Networks Juniper Junos 安全绕过漏洞
CVE-2014-6380Juniper Networks Juniper Junos 拒绝服务漏洞
CVE-2014-8069YOOtheme Pagekit CMS 跨站脚本漏洞
CVE-2014-8070YOOtheme Pagekit CMS 开放重定向漏洞
CVE-2014-8765Drupal Project Issue File Review模块跨站脚本漏洞
CVE-2014-8766Allomani Weblinks SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-3818

No comments yet


Leave a comment