543
VMScore

CVE-2018-0003

Published: 10/01/2018 Updated: 03/10/2019
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 543
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D71; 12.3 versions before 12.3R12-S7; 12.3X48 versions before 12.3X48-D55; 14.1 versions before 14.1R8-S5, 14.1R9; 14.1X53 versions before 14.1X53-D45, 14.1X53-D107; 14.2 versions before 14.2R7-S7, 14.2R8; 15.1 versions before 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions before 15.1X49-D100; 15.1X53 versions before 15.1X53-D65, 15.1X53-D231; 16.1 versions before 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions before 16.1X65-D45; 16.2 versions before 16.2R2-S1, 16.2R3; 17.1 versions before 17.1R2-S2, 17.1R3; 17.2 versions before 17.2R1-S3, 17.2R2; 17.2X75 versions before 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.1x46

juniper junos 12.3x48

juniper junos 15.1x49

juniper junos 14.1x53

juniper junos 15.1x53

juniper junos 14.1

juniper junos 14.2

juniper junos 16.1

juniper junos 16.1x65

juniper junos 17.2x75

juniper junos 15.1

juniper junos 12.3

juniper junos 16.2

juniper junos 17.1

juniper junos 17.2