目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-1640— Juniper Networks Junos OS 输入验证错误漏洞

CVSS 7.5 · High EPSS 0.45% · P64
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-1640の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash.
ソース: NVD (National Vulnerability Database)
脆弱性説明
An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuously sending any of these types of formatted genuine packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. Authentication to the BGP peer is not required. This issue can be initiated or propagated through eBGP and iBGP and can impact devices in either modes of use as long as the devices are configured to support the compromised framework and a BGP path is activated or active. This issue affects: Juniper Networks Junos OS 16.1 versions 16.1R7-S6 and later versions prior to 16.1R7-S8; 17.3 versions 17.3R2-S5, 17.3R3-S6 and later versions prior to 17.3R3-S8; 17.4 versions 17.4R2-S7, 17.4R3 and later versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions 18.1R3-S7 and later versions prior to 18.1R3-S10; 18.2 versions 18.2R2-S6, 18.2R3-S2 and later versions prior to 18.2R2-S7, 18.2R3-S5; 18.2X75 versions 18.2X75-D12, 18.2X75-D32, 18.2X75-D33, 18.2X75-D51, 18.2X75-D60, 18.2X75-D411, 18.2X75-D420 and later versions prior to 18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-D52, 18.2X75-D60, 18.2X75-D65, 18.2X75-D70;(*1) 18.3 versions 18.3R1-S6, 18.3R2-S3, 18.3R3 and later versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions 18.4R1-S5, 18.4R2-S4, 18.4R3 and later versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S3(*2); 19.1 versions 19.1R1-S3, 19.1R2 and later versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3-S2; 19.2 versions 19.2R1-S2, 19.2R2 and later versions prior to 19.2R1-S5, 19.2R2, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2, 19.4R3; 20.1 versions prior to 20.1R1-S1, 20.1R2. This issue does not affect Junos OS prior to 16.1R1. This issue affects IPv4 and IPv6 traffic.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
验证框架使用不当
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS 输入验证错误漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中存在安全漏洞,该漏洞源于在路由进程守护程序(RPD)中处理传入的正版BGP数据包时没有正确使用验证框架。攻击者可利用该漏洞导致RPD进程崩溃(拒绝服务)。以下产品及版本受到影响:Juniper Networks Junos OS 16.1版本,16.2版本,
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 16.1R7-S6 ~ 16.1* -

II. CVE-2020-1640の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-1640のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-07-17 · 15 CVEs total

CVE-2020-16549.8 CRITICALJunos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is en
CVE-2020-16479.8 CRITICALJunos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution d
CVE-2020-16458.3 HIGHJunos OS: MX Series: Services card might restart when DNS filtering is enabled
CVE-2020-16537.5 HIGHJunos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak
CVE-2020-16497.5 HIGHJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reass
CVE-2020-16507.5 HIGHJunos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-M
CVE-2020-16487.5 HIGHJunos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
CVE-2020-16467.5 HIGHJunos OS and Junos OS Evolved: RPD crash while processing a specific BGP update informatio
CVE-2020-16447.5 HIGHJunos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets
CVE-2020-16516.5 MEDIUMJunos OS: MX Series: PFE on the line card may crash due to memory leak.
CVE-2020-16416.5 MEDIUMJunos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and a
CVE-2020-16525.6 MEDIUMJunos Space: OpenNMS is accessible via port 9443
CVE-2020-16435.5 MEDIUMJunos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from
CVE-2020-16555.3 MEDIUMJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmen

IV. 関連脆弱性

V. CVE-2020-1640へのコメント

まだコメントはありません


コメントを残す