Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0003— Junos OS: A flowspec BGP update with a specific term-order causes routing protocol daemon (rpd) process to crash with a core.

EPSS 0.61% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-0003

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: A flowspec BGP update with a specific term-order causes routing protocol daemon (rpd) process to crash with a core.
Source: NVD (National Vulnerability Database)
Vulnerability Description
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 14.1X53 versions prior to 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 15.1 versions prior to 15.1R3; 15.1F versions prior to 15.1F3; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
可达断言
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Junos OS 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Junos OS中存在安全漏洞。攻击者可利用该漏洞造成路由协议守护进程崩溃,生成core文件。以下版本受到影响:Juniper Junos OS 12.1X46版本,12.3版本,12.3X48版本,14.1X53版本,15.1版本,15.1F版本,15.1X49版本,15.1X53版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.1X46 ~ 12.1X46-D77 -
Juniper NetworksJunos OS 12.3 ~ 12.3R12-S10 -
Juniper NetworksJunos OS 14.1X53 ~ 14.1X53-D47 -
Juniper NetworksJunos OS 15.1X53 ~ 15.1X53-D59 -

II. Public POCs for CVE-2019-0003

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-0003

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-01-15 · 26 CVEs total

CVE-2019-0016Junos Space: Authenticated user able to delete devices without delete device privileges
CVE-2019-0030Juniper ATP: Password hashing uses DES and a hardcoded salt
CVE-2019-0029Juniper ATP: Splunk credentials are in logged in clear text
CVE-2019-0027Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration
CVE-2019-0026Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration
CVE-2019-0025Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu
CVE-2019-0024Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu
CVE-2019-0023Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu
CVE-2019-0022Juniper ATP: Two hard coded credentials sharing the same password give an attacker the abi
CVE-2019-0021Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text
CVE-2019-0020Juniper ATP: Hard coded credentials used in Web Collector
CVE-2019-0018Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu
CVE-2019-0017Junos Space: Unrestricted file upload vulnerability
CVE-2019-0001Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber managem
CVE-2019-0015Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections u
CVE-2019-0014Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packe
CVE-2019-0013Junos OS: RPD crash upon receipt of malformed PIM packet
CVE-2019-0012Junos OS: rpd crash on VPLS PE upon receipt of specific BGP message
CVE-2019-0011Junos OS: Kernel crash after processing specific incoming packet to the out of band manage
CVE-2019-0010Junos OS: SRX Series: Crafted HTTP traffic may cause UTM to consume all mbufs, leading to

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-0003

No comments yet


Leave a comment