9.8

CVE-2020-1654

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, processing a malformed HTTP message can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) Continued processing of this malformed HTTP message may result in an extended Denial of Service (DoS) condition. The offending HTTP message that causes this issue may originate both from the HTTP server or the HTTP client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prior to 18.1R3-S9 ; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R2-S4, 18.3R3-S1; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3; 19.1 versions prior to 19.1R1-S5, 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version18.1 Update-
JuniperJunos Version18.1 Updater1
JuniperJunos Version18.1 Updater2
JuniperJunos Version18.1 Updater2-s1
JuniperJunos Version18.1 Updater2-s2
JuniperJunos Version18.1 Updater2-s4
JuniperJunos Version18.1 Updater3
JuniperJunos Version18.1 Updater3-s1
JuniperJunos Version18.1 Updater3-s2
JuniperJunos Version18.1 Updater3-s3
JuniperJunos Version18.1 Updater3-s4
JuniperJunos Version18.1 Updater3-s6
JuniperJunos Version18.1 Updater3-s7
JuniperJunos Version18.1 Updater3-s8
JuniperJunos Version18.2 Update-
JuniperJunos Version18.2 Updater1
JuniperJunos Version18.2 Updater1 Edition-
JuniperJunos Version18.2 Updater1-s3
JuniperJunos Version18.2 Updater1-s4
JuniperJunos Version18.2 Updater1-s5
JuniperJunos Version18.2 Updater2
JuniperJunos Version18.2 Updater2-s1
JuniperJunos Version18.2 Updater2-s2
JuniperJunos Version18.2 Updater2-s3
JuniperJunos Version18.2 Updater2-s4
JuniperJunos Version18.2 Updater2-s5
JuniperJunos Version18.2 Updater2-s6
JuniperJunos Version18.2 Updater3
JuniperJunos Version18.2 Updater3-s1
JuniperJunos Version18.2 Updater3-s2
JuniperJunos Version18.3 Update-
JuniperJunos Version18.3 Updater1
JuniperJunos Version18.3 Updater1-s1
JuniperJunos Version18.3 Updater1-s2
JuniperJunos Version18.3 Updater1-s3
JuniperJunos Version18.3 Updater1-s5
JuniperJunos Version18.3 Updater1-s6
JuniperJunos Version18.3 Updater2
JuniperJunos Version18.3 Updater2-s1
JuniperJunos Version18.3 Updater2-s2
JuniperJunos Version18.3 Updater2-s3
JuniperJunos Version18.3 Updater3
JuniperJunos Version18.4 Update-
JuniperJunos Version18.4 Updater1
JuniperJunos Version18.4 Updater1-s1
JuniperJunos Version18.4 Updater1-s2
JuniperJunos Version18.4 Updater1-s5
JuniperJunos Version18.4 Updater1-s6
JuniperJunos Version18.4 Updater2
JuniperJunos Version18.4 Updater2-s1
JuniperJunos Version18.4 Updater2-s2
JuniperJunos Version18.4 Updater2-s3
JuniperJunos Version19.1 Update-
JuniperJunos Version19.1 Updater1
JuniperJunos Version19.1 Updater1-s1
JuniperJunos Version19.1 Updater1-s2
JuniperJunos Version19.1 Updater1-s3
JuniperJunos Version19.1 Updater1-s4
JuniperJunos Version19.2 Update-
JuniperJunos Version19.2 Updater1
JuniperJunos Version19.2 Updater1-s1
JuniperJunos Version19.3 Update-
JuniperJunos Version19.3 Updater1
JuniperJunos Version19.3 Updater1-s1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.13% 0.826
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
sirt@juniper.net 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.