Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0055— Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message

EPSS 0.24% · P47
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0055

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message
Source: NVD (National Vulnerability Database)
Vulnerability Description
Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuous receipt of crafted DHCPv6 packets could leaded to an extended denial of service condition. This issue only affects Junos OS 15.1 and later. Earlier releases are unaffected by this issue. Devices are only vulnerable to the specially crafted DHCPv6 message if DHCP services are configured. Devices not configured to act as a DHCP server are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D235, 15.1X53-D495; 16.1 versions prior to 16.1R4-S11, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9; 17.2 versions prior to 17.2R2-S6; 17.3 versions prior to 17.3R3-S1; 17.4 versions prior to 17.4R1-S5; 18.1 versions prior to 18.1R2-S3; 18.2 versions prior to 18.2R1-S2; 18.2X75 versions prior to 18.2X75-D20.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Junos OS中存在拒绝服务漏洞。攻击者可通过发送特制的DHCPv6消息利用该漏洞造成拒绝服务(jdhcpd守护进程崩溃)。以下版本受到影响:Juniper Junos OS 15.1版本,15.1X49版本,15.1X53版本,16.1版本,16.2版本,17.1版本,17.2版本,17.3版本,17.4版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 15.1 ~ 15.1R7-S2 -

II. Public POCs for CVE-2018-0055

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0055

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2018-10-10 · 21 CVEs total

CVE-2018-0053vSRX Series: A local authentication vulnerability may lead to full control of a vSRX insta
CVE-2018-0063Junos OS: Nexthop index allocation failed: private index space exhausted after incoming AR
CVE-2018-0062Junos OS: Denial of Service in J-Web
CVE-2018-0061Junos OS: Denial of service in telnetd
CVE-2018-0060Junos OS: Invalid IP/mask learned from DHCP server might cause device control daemon (dcd)
CVE-2018-0059ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability
CVE-2018-0058MX Series: In BBE configurations, receipt of a crafted IPv6 exception packet causes a Deni
CVE-2018-0057Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in wi
CVE-2018-0056MX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interface
CVE-2018-0054QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames
CVE-2018-0043Junos OS: RPD daemon crashes upon receipt of specific MPLS packet
CVE-2018-0052Junos OS: Unauthenticated remote root access possible when RSH service is enabled
CVE-2018-0051Junos OS: Denial of Service vulnerability in MS-PIC, MS-MIC, MS-MPC, MS-DPC and SRX flow d
CVE-2018-0050Junos OS: Receipt of a malformed MPLS RSVP packet leads to a Routing Protocols Daemon (RPD
CVE-2018-0049Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel
CVE-2018-0048Junos OS: Memory exhaustion denial of service vulnerability in Routing Protocols Daemon (R
CVE-2018-0047Junos Space Security Director: XSS vulnerability in web administration
CVE-2018-0046Junos Space: Reflected Cross-site Scripting vulnerability in OpenNMS
CVE-2018-0045Junos OS: RPD daemon crashes due to receipt of specific Draft-Rosen MVPN control packet in
CVE-2018-0044NFX Series: Insecure sshd configuration in Juniper Device Manager (JDM) and host OS

IV. Related Vulnerabilities

V. Comments for CVE-2018-0055

No comments yet


Leave a comment