| Summary | A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D45; 12.3X48 prior to 12.3X48-D30; 14.1 prior to 14.1R4-S9, 14.1R8; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D232, 15.1X53-D47. |
|---|---|
| Publication Date | Oct. 14, 2017, 2:29 a.m. |
| Registration Date | Jan. 26, 2021, 1:12 p.m. |
| Last Update | Nov. 21, 2024, 12:06 p.m. |
| CVSS3.0 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* | |||||
| Title | Juniper Networks Junos OS におけるリソースの枯渇に関する脆弱性 |
|---|---|
| Summary | Juniper Networks Junos OS には、リソースの枯渇に関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 11, 2017, midnight |
| Registration Date | Nov. 10, 2017, 11:31 a.m. |
| Last Update | Nov. 10, 2017, 11:31 a.m. |
| ジュニパーネットワークス |
| Junos OS 12.1X46-D45 未満の 12.1X46 |
| Junos OS 12.3X48-D30 未満の 12.3X48 |
| Junos OS 14.1R4-S9 未満の 14.1 |
| Junos OS 14.1R8 |
| Junos OS 14.2R6 未満の 14.2 |
| Junos OS 15.1F5 未満の 15.1 |
| Junos OS 15.1R3 |
| Junos OS 15.1X49-D40 未満の 15.1X49 |
| Junos OS 15.1X53-D232 未満の 15.1X53 |
| Junos OS 15.1X53-D47 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年11月10日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |