ID

VAR-202010-0398


CVE

CVE-2020-1667


TITLE

Juniper Networks Junos OS  Race Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-012197

DESCRIPTION

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspmand process, responsible for managing "URL Filtering service", can crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2. Juniper Networks Junos OS Is vulnerable to a race condition.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Junos OS that could be exploited by an attacker to trigger a fatal error through DNS filtering to trigger a denial of service

Trust: 1.8

sources: NVD: CVE-2020-1667 // JVNDB: JVNDB-2020-012197 // VULHUB: VHN-169771 // VULMON: CVE-2020-1667

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-012197 // NVD: CVE-2020-1667

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-1667
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2020-1667
value: HIGH

Trust: 1.0

NVD: CVE-2020-1667
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-668
value: HIGH

Trust: 0.6

VULHUB: VHN-169771
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-1667
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-1667
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-169771
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sirt@juniper.net: CVE-2020-1667
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.7
version: 3.1

Trust: 1.0

OTHER: JVNDB-2020-012197
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169771 // VULMON: CVE-2020-1667 // JVNDB: JVNDB-2020-012197 // CNNVD: CNNVD-202010-668 // NVD: CVE-2020-1667 // NVD: CVE-2020-1667

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:Race condition (CWE-362) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-169771 // JVNDB: JVNDB-2020-012197 // NVD: CVE-2020-1667

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-668

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-202010-668

PATCH

title:JSA11064url:https://kb.juniper.net/JSA11064

Trust: 0.8

title:Juniper Networks Junos OS Repair measures for the competition condition problem loopholeurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131302

Trust: 0.6

sources: JVNDB: JVNDB-2020-012197 // CNNVD: CNNVD-202010-668

EXTERNAL IDS

db:NVDid:CVE-2020-1667

Trust: 2.6

db:JUNIPERid:JSA11064

Trust: 1.7

db:JVNDBid:JVNDB-2020-012197

Trust: 0.8

db:CNNVDid:CNNVD-202010-668

Trust: 0.7

db:CNVDid:CNVD-2020-57866

Trust: 0.1

db:VULHUBid:VHN-169771

Trust: 0.1

db:VULMONid:CVE-2020-1667

Trust: 0.1

sources: VULHUB: VHN-169771 // VULMON: CVE-2020-1667 // JVNDB: JVNDB-2020-012197 // CNNVD: CNNVD-202010-668 // NVD: CVE-2020-1667

REFERENCES

url:https://kb.juniper.net/

Trust: 1.8

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa11064&cat=mx_series&actp=list

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-1667

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-mx-denial-of-service-via-dns-filtering-33584

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-169771 // VULMON: CVE-2020-1667 // JVNDB: JVNDB-2020-012197 // CNNVD: CNNVD-202010-668 // NVD: CVE-2020-1667

SOURCES

db:VULHUBid:VHN-169771
db:VULMONid:CVE-2020-1667
db:JVNDBid:JVNDB-2020-012197
db:CNNVDid:CNNVD-202010-668
db:NVDid:CVE-2020-1667

LAST UPDATE DATE

2024-11-23T22:21:01.671000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169771date:2020-10-27T00:00:00
db:VULMONid:CVE-2020-1667date:2020-10-27T00:00:00
db:JVNDBid:JVNDB-2020-012197date:2021-04-27T05:33:00
db:CNNVDid:CNNVD-202010-668date:2020-10-28T00:00:00
db:NVDid:CVE-2020-1667date:2024-11-21T05:11:07.213

SOURCES RELEASE DATE

db:VULHUBid:VHN-169771date:2020-10-16T00:00:00
db:VULMONid:CVE-2020-1667date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2020-012197date:2021-04-27T00:00:00
db:CNNVDid:CNNVD-202010-668date:2020-10-15T00:00:00
db:NVDid:CVE-2020-1667date:2020-10-16T21:15:12.753