9.8

CVE-2020-1647

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP message may result in an extended Denial of Service (DoS). The offending HTTP message that causes this issue may originate both from the HTTP server or the client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S1; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version18.1 Update-
JuniperJunos Version18.1 Updater1
JuniperJunos Version18.1 Updater2
JuniperJunos Version18.1 Updater2-s1
JuniperJunos Version18.1 Updater2-s2
JuniperJunos Version18.1 Updater2-s4
JuniperJunos Version18.1 Updater3
JuniperJunos Version18.1 Updater3-s1
JuniperJunos Version18.1 Updater3-s2
JuniperJunos Version18.1 Updater3-s3
JuniperJunos Version18.1 Updater3-s4
JuniperJunos Version18.1 Updater3-s6
JuniperJunos Version18.1 Updater3-s7
JuniperJunos Version18.1 Updater3-s8
JuniperJunos Version18.2 Update-
JuniperJunos Version18.2 Updater1
JuniperJunos Version18.2 Updater1 Edition-
JuniperJunos Version18.2 Updater1-s3
JuniperJunos Version18.2 Updater1-s4
JuniperJunos Version18.2 Updater1-s5
JuniperJunos Version18.2 Updater2
JuniperJunos Version18.2 Updater2-s1
JuniperJunos Version18.2 Updater2-s2
JuniperJunos Version18.2 Updater2-s3
JuniperJunos Version18.2 Updater2-s4
JuniperJunos Version18.2 Updater2-s5
JuniperJunos Version18.2 Updater2-s6
JuniperJunos Version18.2 Updater3
JuniperJunos Version18.2 Updater3-s1
JuniperJunos Version18.2 Updater3-s2
JuniperJunos Version18.3 Update-
JuniperJunos Version18.3 Updater1
JuniperJunos Version18.3 Updater1-s1
JuniperJunos Version18.3 Updater1-s2
JuniperJunos Version18.3 Updater1-s3
JuniperJunos Version18.3 Updater1-s5
JuniperJunos Version18.3 Updater1-s6
JuniperJunos Version18.3 Updater2
JuniperJunos Version18.3 Updater2-s1
JuniperJunos Version18.3 Updater2-s2
JuniperJunos Version18.3 Updater2-s3
JuniperJunos Version18.3 Updater3
JuniperJunos Version18.4 Update-
JuniperJunos Version18.4 Updater1
JuniperJunos Version18.4 Updater1-s1
JuniperJunos Version18.4 Updater1-s2
JuniperJunos Version18.4 Updater1-s5
JuniperJunos Version18.4 Updater1-s6
JuniperJunos Version18.4 Updater2
JuniperJunos Version18.4 Updater2-s1
JuniperJunos Version18.4 Updater2-s2
JuniperJunos Version18.4 Updater2-s3
JuniperJunos Version18.4 Updater2-s4
JuniperJunos Version19.1 Update-
JuniperJunos Version19.1 Updater1
JuniperJunos Version19.1 Updater1-s1
JuniperJunos Version19.1 Updater1-s2
JuniperJunos Version19.1 Updater1-s3
JuniperJunos Version19.1 Updater1-s4
JuniperJunos Version19.2 Update-
JuniperJunos Version19.2 Updater1
JuniperJunos Version19.2 Updater1-s1
JuniperJunos Version19.3 Update-
JuniperJunos Version19.3 Updater1
JuniperJunos Version19.3 Updater1-s1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.99% 0.82
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
sirt@juniper.net 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-415 Double Free

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.