ID

VAR-201710-0251


CVE

CVE-2017-10619


TITLE

Juniper Networks Junos OS Data processing vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-009395

DESCRIPTION

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800. Juniper Networks Junos OS Contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Juniper SRX1400 and others are firewall devices of Juniper Networks (Juniper Networks). Junos OS is a set of operating systems running on it. There are security vulnerabilities in the high availability cluster configuration mode of Junos OS 12.3X48 and 15.1X49 in several Juniper Networks products

Trust: 1.71

sources: NVD: CVE-2017-10619 // JVNDB: JVNDB-2017-009395 // VULHUB: VHN-100959

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.6

vendor:junipermodel:junos osscope:ltversion:12.3x48

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1x49

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x49-d80

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3x48-d45

Trust: 0.8

sources: JVNDB: JVNDB-2017-009395 // CNNVD: CNNVD-201710-508 // NVD: CVE-2017-10619

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-10619
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2017-10619
value: HIGH

Trust: 1.0

NVD: CVE-2017-10619
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201710-508
value: HIGH

Trust: 0.6

VULHUB: VHN-100959
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-10619
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-100959
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-10619
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-100959 // JVNDB: JVNDB-2017-009395 // CNNVD: CNNVD-201710-508 // NVD: CVE-2017-10619 // NVD: CVE-2017-10619

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-19

Trust: 0.9

sources: VULHUB: VHN-100959 // JVNDB: JVNDB-2017-009395 // NVD: CVE-2017-10619

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201710-508

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201710-508

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009395

PATCH

title:JSA10821url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10821&actp=METADATA

Trust: 0.8

title:Multiple Juniper Networks product Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75544

Trust: 0.6

sources: JVNDB: JVNDB-2017-009395 // CNNVD: CNNVD-201710-508

EXTERNAL IDS

db:NVDid:CVE-2017-10619

Trust: 2.5

db:JUNIPERid:JSA10821

Trust: 1.7

db:JVNDBid:JVNDB-2017-009395

Trust: 0.8

db:CNNVDid:CNNVD-201710-508

Trust: 0.7

db:VULHUBid:VHN-100959

Trust: 0.1

sources: VULHUB: VHN-100959 // JVNDB: JVNDB-2017-009395 // CNNVD: CNNVD-201710-508 // NVD: CVE-2017-10619

REFERENCES

url:https://kb.juniper.net/jsa10821

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10619

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-10619

Trust: 0.8

sources: VULHUB: VHN-100959 // JVNDB: JVNDB-2017-009395 // CNNVD: CNNVD-201710-508 // NVD: CVE-2017-10619

SOURCES

db:VULHUBid:VHN-100959
db:JVNDBid:JVNDB-2017-009395
db:CNNVDid:CNNVD-201710-508
db:NVDid:CVE-2017-10619

LAST UPDATE DATE

2024-08-14T15:08:13.757000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-100959date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2017-009395date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201710-508date:2019-10-17T00:00:00
db:NVDid:CVE-2017-10619date:2019-10-09T23:21:42.167

SOURCES RELEASE DATE

db:VULHUBid:VHN-100959date:2017-10-13T00:00:00
db:JVNDBid:JVNDB-2017-009395date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201710-508date:2017-10-18T00:00:00
db:NVDid:CVE-2017-10619date:2017-10-13T17:29:00.893