5.9
CVSSv3

CVE-2018-0002

Published: 10/01/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D60 on SRX series; 12.3X48 versions before 12.3X48-D35 on SRX series; 14.1 versions before 14.1R9 on MX series; 14.2 versions before 14.2R8 on MX series; 15.1X49 versions before 15.1X49-D60 on SRX series; 15.1 versions before 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series; 16.1 versions before 16.1R6 on MX series; 16.2 versions before 16.2R3 on MX series; 17.1 versions before 17.1R2-S4, 17.1R3 on MX series. No other Juniper Networks products or platforms are affected by this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.1x46

juniper junos 12.3x48

juniper junos 14.1

juniper junos 14.2

juniper junos 15.1x49

juniper junos 15.1

juniper junos 16.1

juniper junos 16.2

juniper junos 17.1

Github Repositories

Fabric8-Analytics Data Models This repository serves as a base for our data modeling work You can easily connect to graphing engine (Gremlin + DynamoDB) running remotely in containers and import models to explore the graphs representing Fabric8-Analytics data Contributing See our contributing guidelines for more info Configuration parameters Keep proper configuration values