7.8

CVE-2014-3818

Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version9.1
JuniperJunos Version9.2
JuniperJunos Version9.4
JuniperJunos Version9.5
JuniperJunos Version9.6
JuniperJunos Version10.0
JuniperJunos Version10.1
JuniperJunos Version10.2
JuniperJunos Version10.3
JuniperJunos Version10.4
JuniperJunos Version10.4r
JuniperJunos Version10.4s
JuniperJunos Version11.0
JuniperJunos Version11.1
JuniperJunos Version11.2
JuniperJunos Version11.3
JuniperJunos Version11.4
JuniperJunos Version12.1
JuniperJunos Version12.1x44
JuniperJunos Version12.1x46
JuniperJunos Version12.1x47
JuniperJunos Version12.1x48
JuniperJunos Version12.2
JuniperJunos Version12.2x50
JuniperJunos Version12.3
JuniperJunos Version13.1
JuniperJunos Version13.1x49
JuniperJunos Version13.1x50
JuniperJunos Version13.2
JuniperJunos Version13.2x50
JuniperJunos Version13.2x51
JuniperJunos Version13.2x52
JuniperJunos Version13.3
JuniperJunos Version14.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.49% 0.628
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.