ID

VAR-201807-0316


CVE

CVE-2018-0032


TITLE

Juniper Networks Junos OS Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-007989

DESCRIPTION

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this advisory. Earlier releases are unaffected by this vulnerability. This crafted BGP UPDATE does not propagate to other BGP peers. Affected releases are Juniper Networks Junos OS: 16.1X65 versions prior to 16.1X65-D47; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D110; 17.3 versions prior to 17.3R1-S4, 17.3R2; 17.4 versions prior to 17.4R1-S3, 17.4R2. Juniper Networks Junos OS Contains an input validation vulnerability.Denial of service (DoS) May be in a state. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Junos OS

Trust: 1.71

sources: NVD: CVE-2018-0032 // JVNDB: JVNDB-2018-007989 // VULHUB: VHN-118234

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:17.4

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:16.1x65

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:17.2x75

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.6

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-007989 // CNNVD: CNNVD-201807-1084 // NVD: CVE-2018-0032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0032
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2018-0032
value: HIGH

Trust: 1.0

NVD: CVE-2018-0032
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201807-1084
value: HIGH

Trust: 0.6

VULHUB: VHN-118234
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0032
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118234
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0032
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-118234 // JVNDB: JVNDB-2018-007989 // CNNVD: CNNVD-201807-1084 // NVD: CVE-2018-0032 // NVD: CVE-2018-0032

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-118234 // JVNDB: JVNDB-2018-007989 // NVD: CVE-2018-0032

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1084

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201807-1084

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007989

PATCH

title:JSA10866url:https://kb.juniper.net/JSA10866

Trust: 0.8

title:Juniper Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82100

Trust: 0.6

sources: JVNDB: JVNDB-2018-007989 // CNNVD: CNNVD-201807-1084

EXTERNAL IDS

db:NVDid:CVE-2018-0032

Trust: 2.5

db:SECTRACKid:1041337

Trust: 1.7

db:JUNIPERid:JSA10866

Trust: 1.7

db:JVNDBid:JVNDB-2018-007989

Trust: 0.8

db:CNNVDid:CNNVD-201807-1084

Trust: 0.7

db:VULHUBid:VHN-118234

Trust: 0.1

sources: VULHUB: VHN-118234 // JVNDB: JVNDB-2018-007989 // CNNVD: CNNVD-201807-1084 // NVD: CVE-2018-0032

REFERENCES

url:https://kb.juniper.net/jsa10866

Trust: 1.7

url:http://www.securitytracker.com/id/1041337

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0032

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0032

Trust: 0.8

sources: VULHUB: VHN-118234 // JVNDB: JVNDB-2018-007989 // CNNVD: CNNVD-201807-1084 // NVD: CVE-2018-0032

SOURCES

db:VULHUBid:VHN-118234
db:JVNDBid:JVNDB-2018-007989
db:CNNVDid:CNNVD-201807-1084
db:NVDid:CVE-2018-0032

LAST UPDATE DATE

2024-11-23T22:06:45.927000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118234date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-007989date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1084date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0032date:2024-11-21T03:37:23.983

SOURCES RELEASE DATE

db:VULHUBid:VHN-118234date:2018-07-11T00:00:00
db:JVNDBid:JVNDB-2018-007989date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1084date:2018-07-12T00:00:00
db:NVDid:CVE-2018-0032date:2018-07-11T18:29:00.573