7.5
CVE-2023-28964
- EPSS 0.61%
- Veröffentlicht 17.04.2023 22:15:08
- Zuletzt bearbeitet 21.11.2024 07:56:17
- Quelle sirt@juniper.net
- CVE-Watchlists
- Unerledigt
Junos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Networks Junos OS: All versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2; Juniper Networks Junos OS Evolved: All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R2-EVO; 20.3 versions prior to 20.3R2-EVO;
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version < 20.1
Juniper ≫ Junos Os Evolved Version20.1 Update-
Juniper ≫ Junos Os Evolved Version20.1 Updater1
Juniper ≫ Junos Os Evolved Version20.1 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s2
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s3
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s4
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s5
Juniper ≫ Junos Os Evolved Version20.2 Update-
Juniper ≫ Junos Os Evolved Version20.2 Updater1
Juniper ≫ Junos Os Evolved Version20.2 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.3 Update-
Juniper ≫ Junos Os Evolved Version20.3 Updater1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s2
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.61% | 0.698 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| sirt@juniper.net | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-130 Improper Handling of Length Parameter Inconsistency
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.