ID

VAR-201507-0045


CVE

CVE-2015-5363


TITLE

Juniper Networks Junos SRX Series SRX Network Security Daemon Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2015-04950 // CNNVD: CNNVD-201507-627

DESCRIPTION

The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 allows remote DNS servers to cause a denial of service (crash) via a crafted DNS response. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. Juniper Networks SRX Series services gateways with Junos are Juniper Networks' SRX Series gateway devices running the Junos operating system. The SRX Network Security Daemon (nsd) is one of the network security daemons. Juniper Junos is prone to a remote denial-of-service vulnerability. Successful exploits may allow the attacker to crash the system; denying service to legitimate users. The following versions are affected: Junos 12.1X44 prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, 12.3X48 prior to 12.3X48-D15

Trust: 2.52

sources: NVD: CVE-2015-5363 // JVNDB: JVNDB-2015-003872 // CNVD: CNVD-2015-04950 // BID: 75722 // VULHUB: VHN-83324

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-04950

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 1.0

vendor:junipermodel:junos osscope:eqversion:12.1x47-d25

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x44

Trust: 0.8

vendor:junipermodel:srx3400scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.3x48

Trust: 0.8

vendor:junipermodel:srx210scope: - version: -

Trust: 0.8

vendor:junipermodel:srx650scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x44-d50

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3x48-d15

Trust: 0.8

vendor:junipermodel:srx550scope: - version: -

Trust: 0.8

vendor:junipermodel:srx5800scope: - version: -

Trust: 0.8

vendor:junipermodel:srx100scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x46

Trust: 0.8

vendor:junipermodel:srx220scope: - version: -

Trust: 0.8

vendor:junipermodel:srx5600scope: - version: -

Trust: 0.8

vendor:junipermodel:srx5400scope: - version: -

Trust: 0.8

vendor:junipermodel:srx110scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x47

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x46-d35

Trust: 0.8

vendor:junipermodel:srx240scope: - version: -

Trust: 0.8

vendor:junipermodel:srx1400scope: - version: -

Trust: 0.8

vendor:junipermodel:srx3600scope: - version: -

Trust: 0.8

vendor:junipermodel:networks junos 12.1x44scope: - version: -

Trust: 0.6

vendor:junipermodel:networks junos 12.1x46scope: - version: -

Trust: 0.6

vendor:junipermodel:networks junos 12.1x47scope: - version: -

Trust: 0.6

vendor:junipermodel:networks junos 12.3x48scope: - version: -

Trust: 0.6

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2015-04950 // BID: 75722 // JVNDB: JVNDB-2015-003872 // CNNVD: CNNVD-201507-627 // NVD: CVE-2015-5363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5363
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-5363
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-04950
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201507-627
value: MEDIUM

Trust: 0.6

VULHUB: VHN-83324
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-5363
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-04950
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-83324
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-04950 // VULHUB: VHN-83324 // JVNDB: JVNDB-2015-003872 // CNNVD: CNNVD-201507-627 // NVD: CVE-2015-5363

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-83324 // JVNDB: JVNDB-2015-003872 // NVD: CVE-2015-5363

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201507-627

TYPE

Design Error

Trust: 0.3

sources: BID: 75722

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003872

PATCH

title:JSA10692url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10692

Trust: 0.8

title:Juniper Networks Junos SRX Series SRX Network Security Daemon Patch for Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/61238

Trust: 0.6

sources: CNVD: CNVD-2015-04950 // JVNDB: JVNDB-2015-003872

EXTERNAL IDS

db:NVDid:CVE-2015-5363

Trust: 3.4

db:JUNIPERid:JSA10692

Trust: 2.6

db:SECTRACKid:1032848

Trust: 1.7

db:BIDid:75722

Trust: 1.0

db:JVNDBid:JVNDB-2015-003872

Trust: 0.8

db:CNNVDid:CNNVD-201507-627

Trust: 0.7

db:CNVDid:CNVD-2015-04950

Trust: 0.6

db:VULHUBid:VHN-83324

Trust: 0.1

sources: CNVD: CNVD-2015-04950 // VULHUB: VHN-83324 // BID: 75722 // JVNDB: JVNDB-2015-003872 // CNNVD: CNNVD-201507-627 // NVD: CVE-2015-5363

REFERENCES

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10692

Trust: 2.2

url:http://www.securitytracker.com/id/1032848

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5363

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5363

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10692&cat=sirt_1&actp=list

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10692

Trust: 0.1

sources: CNVD: CNVD-2015-04950 // VULHUB: VHN-83324 // BID: 75722 // JVNDB: JVNDB-2015-003872 // CNNVD: CNNVD-201507-627 // NVD: CVE-2015-5363

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 75722

SOURCES

db:CNVDid:CNVD-2015-04950
db:VULHUBid:VHN-83324
db:BIDid:75722
db:JVNDBid:JVNDB-2015-003872
db:CNNVDid:CNNVD-201507-627
db:NVDid:CVE-2015-5363

LAST UPDATE DATE

2024-11-23T23:12:39.083000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-04950date:2015-07-29T00:00:00
db:VULHUBid:VHN-83324date:2015-07-21T00:00:00
db:BIDid:75722date:2015-07-13T00:00:00
db:JVNDBid:JVNDB-2015-003872date:2015-07-23T00:00:00
db:CNNVDid:CNNVD-201507-627date:2015-07-17T00:00:00
db:NVDid:CVE-2015-5363date:2024-11-21T02:32:52.843

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-04950date:2015-07-28T00:00:00
db:VULHUBid:VHN-83324date:2015-07-16T00:00:00
db:BIDid:75722date:2015-07-13T00:00:00
db:JVNDBid:JVNDB-2015-003872date:2015-07-23T00:00:00
db:CNNVDid:CNNVD-201507-627date:2015-07-17T00:00:00
db:NVDid:CVE-2015-5363date:2015-07-16T14:59:09.747