ID

VAR-202007-0721


CVE

CVE-2020-1647


TITLE

Juniper Networks Junos OS Double Release Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-008316

DESCRIPTION

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP message may result in an extended Denial of Service (DoS). The offending HTTP message that causes this issue may originate both from the HTTP server or the client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S1; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1. Juniper Networks Junos OS Exists in a double release vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The operating system provides a secure programming interface and Junos SDK. A remote attacker could exploit this vulnerability to cause a denial of service or to execute code

Trust: 1.71

sources: NVD: CVE-2020-1647 // JVNDB: JVNDB-2020-008316 // VULHUB: VHN-169551

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:18.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-008316 // NVD: CVE-2020-1647

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-1647
value: CRITICAL

Trust: 1.0

sirt@juniper.net: CVE-2020-1647
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-008316
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202007-416
value: CRITICAL

Trust: 0.6

VULHUB: VHN-169551
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-1647
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008316
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-169551
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-1647
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: JVNDB-2020-008316
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169551 // JVNDB: JVNDB-2020-008316 // CNNVD: CNNVD-202007-416 // NVD: CVE-2020-1647 // NVD: CVE-2020-1647

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.9

sources: VULHUB: VHN-169551 // JVNDB: JVNDB-2020-008316 // NVD: CVE-2020-1647

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-416

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202007-416

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008316

PATCH

title:JSA11034url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11034&actp=METADATA

Trust: 0.8

title:Juniper Networks Junos OS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=124331

Trust: 0.6

sources: JVNDB: JVNDB-2020-008316 // CNNVD: CNNVD-202007-416

EXTERNAL IDS

db:NVDid:CVE-2020-1647

Trust: 2.5

db:JUNIPERid:JSA11034

Trust: 1.7

db:JVNDBid:JVNDB-2020-008316

Trust: 0.8

db:CNNVDid:CNNVD-202007-416

Trust: 0.7

db:CNVDid:CNVD-2020-43753

Trust: 0.1

db:VULHUBid:VHN-169551

Trust: 0.1

sources: VULHUB: VHN-169551 // JVNDB: JVNDB-2020-008316 // CNNVD: CNNVD-202007-416 // NVD: CVE-2020-1647

REFERENCES

url:https://kb.juniper.net/jsa11034

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-1647

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1647

Trust: 0.8

url:https://vigilance.fr/vulnerability/junos-os-srx-use-after-free-via-http-icap-redirect-service-32774

Trust: 0.6

sources: VULHUB: VHN-169551 // JVNDB: JVNDB-2020-008316 // CNNVD: CNNVD-202007-416 // NVD: CVE-2020-1647

SOURCES

db:VULHUBid:VHN-169551
db:JVNDBid:JVNDB-2020-008316
db:CNNVDid:CNNVD-202007-416
db:NVDid:CVE-2020-1647

LAST UPDATE DATE

2024-08-14T13:24:23.903000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169551date:2020-07-24T00:00:00
db:JVNDBid:JVNDB-2020-008316date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-416date:2020-07-27T00:00:00
db:NVDid:CVE-2020-1647date:2020-07-24T20:03:39.207

SOURCES RELEASE DATE

db:VULHUBid:VHN-169551date:2020-07-17T00:00:00
db:JVNDBid:JVNDB-2020-008316date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-416date:2020-07-09T00:00:00
db:NVDid:CVE-2020-1647date:2020-07-17T19:15:13.140