ID

VAR-201804-0663


CVE

CVE-2018-0016


TITLE

Juniper Networks Junos OS Vulnerabilities related to security functions

Trust: 0.8

sources: JVNDB: JVNDB-2018-004321

DESCRIPTION

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram if 'clns-routing' or ES-IS is explicitly configured. Devices with without CLNS enabled are not vulnerable to this issue. Devices with IS-IS configured on the interface are not vulnerable to this issue unless CLNS routing is also enabled. This issue only affects devices running Junos OS 15.1. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5-S3, 15.1F6-S8, 15.1F7, 15.1R5; 15.1X49 versions prior to 15.1X49-D60; 15.1X53 versions prior to 15.1X53-D66, 15.1X53-D233, 15.1X53-D471. Earlier releases are unaffected by this vulnerability, and the issue has been resolved in Junos OS 16.1R1 and all subsequent releases. Juniper Networks Junos OS Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. Input validation vulnerabilities exist in Juniper Junos OS Releases 12.1X46, 12.3X48, and 15.1X49

Trust: 1.98

sources: NVD: CVE-2018-0016 // JVNDB: JVNDB-2018-004321 // BID: 103747 // VULHUB: VHN-118218

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:15.1x53

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:15.1f

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1f6

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1f4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1f5

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1f2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1f3

Trust: 1.0

vendor:junipermodel:junos osscope:ltversion:15.1x53

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d66

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1f6-s8

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x49-d60

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1f5-s3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d471

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1f7

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1r5

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d233

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1x49

Trust: 0.8

vendor:junipermodel:junos 15.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6-s7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6-s5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6-s4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d66scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d471scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d233scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d60scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r5scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6-s8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5-s3scope:neversion: -

Trust: 0.3

sources: BID: 103747 // JVNDB: JVNDB-2018-004321 // CNNVD: CNNVD-201804-519 // NVD: CVE-2018-0016

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0016
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2018-0016
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0016
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201804-519
value: HIGH

Trust: 0.6

VULHUB: VHN-118218
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0016
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118218
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0016
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.8

sirt@juniper.net: CVE-2018-0016
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-118218 // JVNDB: JVNDB-2018-004321 // CNNVD: CNNVD-201804-519 // NVD: CVE-2018-0016 // NVD: CVE-2018-0016

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-118218 // JVNDB: JVNDB-2018-004321 // NVD: CVE-2018-0016

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-519

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201804-519

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004321

PATCH

title:JSA10844url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10844&actp=METADATA

Trust: 0.8

title:Juniper Junos OS Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83285

Trust: 0.6

sources: JVNDB: JVNDB-2018-004321 // CNNVD: CNNVD-201804-519

EXTERNAL IDS

db:NVDid:CVE-2018-0016

Trust: 2.8

db:JUNIPERid:JSA10844

Trust: 2.0

db:BIDid:103747

Trust: 2.0

db:SECTRACKid:1040784

Trust: 1.7

db:JVNDBid:JVNDB-2018-004321

Trust: 0.8

db:CNNVDid:CNNVD-201804-519

Trust: 0.7

db:VULHUBid:VHN-118218

Trust: 0.1

sources: VULHUB: VHN-118218 // BID: 103747 // JVNDB: JVNDB-2018-004321 // CNNVD: CNNVD-201804-519 // NVD: CVE-2018-0016

REFERENCES

url:http://www.securityfocus.com/bid/103747

Trust: 1.7

url:https://kb.juniper.net/jsa10844

Trust: 1.7

url:http://www.securitytracker.com/id/1040784

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0016

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0016

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10844&cat=sirt_1&actp=list

Trust: 0.3

sources: VULHUB: VHN-118218 // BID: 103747 // JVNDB: JVNDB-2018-004321 // CNNVD: CNNVD-201804-519 // NVD: CVE-2018-0016

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 103747

SOURCES

db:VULHUBid:VHN-118218
db:BIDid:103747
db:JVNDBid:JVNDB-2018-004321
db:CNNVDid:CNNVD-201804-519
db:NVDid:CVE-2018-0016

LAST UPDATE DATE

2024-08-14T13:56:08.220000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118218date:2019-10-09T00:00:00
db:BIDid:103747date:2018-04-11T00:00:00
db:JVNDBid:JVNDB-2018-004321date:2018-06-18T00:00:00
db:CNNVDid:CNNVD-201804-519date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0016date:2019-10-09T23:30:58.330

SOURCES RELEASE DATE

db:VULHUBid:VHN-118218date:2018-04-11T00:00:00
db:BIDid:103747date:2018-04-11T00:00:00
db:JVNDBid:JVNDB-2018-004321date:2018-06-18T00:00:00
db:CNNVDid:CNNVD-201804-519date:2018-04-11T00:00:00
db:NVDid:CVE-2018-0016date:2018-04-11T19:29:00.277