目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2019-0061— Juniper Networks Junos OS 安全漏洞

CVSS 7.8 · High EPSS 0.04% · P12
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2019-0061の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation
ソース: NVD (National Vulnerability Database)
脆弱性説明
The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
违背安全设计原则
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中存在安全漏洞,该漏洞源于程序没有正确配置内部套接字。本地攻击者可利用该漏洞获取管理权限。以下产品及版本受到影响:Juniper Networks Junos OS 15.1X49版本,15.1X53版本,16.1版本,16.2版本,17.1版本,17.2版本
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 15.1X49 ~ 15.1X49-D171, 15.1X49-D180 -

II. CVE-2019-0061の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2019-0061のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-10-09 · 25 CVEs total

CVE-2019-00478.8 HIGHJunos OS: Persistent XSS vulnerability in J-Web
CVE-2019-00708.8 HIGHJunos OS: NFX Series: An Improper Input Validation weakness allows a malicious local attac
CVE-2019-00587.8 HIGHJunos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation.
CVE-2019-00577.8 HIGHNFX Series: An attacker may be able to take control of the JDM application and subsequentl
CVE-2019-00717.8 HIGHJunos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific vers
CVE-2019-00607.5 HIGHJunos OS: SRX Series: flowd process crash due to processing of specific transit IP packets
CVE-2019-00567.5 HIGHJunos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to
CVE-2019-00557.5 HIGHJunos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP tr
CVE-2019-00507.5 HIGHJunos OS: SRX1500: Denial of service due to crash of srxpfe process under heavy traffic co
CVE-2019-00757.5 HIGHJunos OS: SRX Series: Denial of Service vulnerability in srxpfe related to PIM
CVE-2019-00667.5 HIGHJunos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the r
CVE-2019-00647.5 HIGHJunos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet
CVE-2019-00627.5 HIGHJunos OS: Session fixation vulnerability in J-Web
CVE-2019-00597.5 HIGHJunos OS: The routing protocol process (rpd) may crash and generate core files upon receip
CVE-2019-00546.8 MEDIUMJunos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks
CVE-2019-00736.6 MEDIUMJunos OS: PKI key pairs are exported with insecure file permissions
CVE-2019-00686.5 MEDIUMJunos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets
CVE-2019-00676.5 MEDIUMJunos OS: Kernel crash (vmcore) upon receipt of a specific link-local IPv6 packet on devic
CVE-2019-00516.5 MEDIUMSRX5000 Series: Denial of Service vulnerability in SSL-Proxy feature.
CVE-2019-00636.5 MEDIUMJunos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message

Showing 20 of 25 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2019-0061へのコメント

まだコメントはありません


コメントを残す