Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"changes": [{"at": "12.1X46-D81", "status": "unaffected"}], "lessThan": "12.1X46*", "status": "affected", "version": "12.1X46-D76", "versionType": "custom"}, {"changes": [{"at": "12.3X48-D75", "status": "unaffected"}], "lessThan": "12.3X48*", "status": "affected", "version": "12.3X48-D66", "versionType": "custom"}, {"changes": [{"at": "15.1X49-D150", "status": "unaffected"}], "lessThan": "15.1X49*", "status": "affected", "version": "15.1X49-D131", "versionType": "custom"}]}, {"product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "12.3R12-S10"}, {"status": "affected", "version": "15.1R4-S9"}, {"status": "affected", "version": "15.1R6-S6"}, {"status": "affected", "version": "17.1R1-S7"}, {"status": "affected", "version": "17.2R1-S6"}, {"changes": [{"at": "15.1R7", "status": "affected"}, {"at": "15.1R7-S2", "status": "unaffected"}], "lessThan": "15.1*", "status": "affected", "version": "15.1F6-S10", "versionType": "custom"}, {"changes": [{"at": "16.1R4-S9", "status": "affected"}, {"at": "16.1R4-S12", "status": "unaffected"}, {"at": "16.1R5-S4", "status": "affected"}, {"at": "16.1R6-S3", "status": "affected"}, {"at": "16.1R6-S6", "status": "unaffected"}, {"at": "16.1R7", "status": "affected"}, {"at": "16.1R7-S2", "status": "unaffected"}], "lessThan": "16.1*", "status": "affected", "version": "16.1R3-S8", "versionType": "custom"}, {"changes": [{"at": "16.2R2-S5", "status": "affected"}, {"at": "16.2R2-S7", "status": "unaffected"}], "lessThan": "16.2*", "status": "affected", "version": "16.2R1-S6", "versionType": "custom"}, {"changes": [{"at": "17.1R2-S9", "status": "unaffected"}], "lessThan": "17.1*", "status": "affected", "version": "17.1R2-S7", "versionType": "custom"}, {"changes": [{"at": "17.2R2-S6", "status": "unaffected"}], "lessThan": "17.2*", "status": "affected", "version": "17.2R2-S4", "versionType": "custom"}, {"changes": [{"at": "17.2X75-D101, 17.2X75-D110", "status": "unaffected"}], "lessThan": "17.2X75*", "status": "affected", "version": "17.2X75-D100", "versionType": "custom"}, {"changes": [{"at": "18.2X75-D20", "status": "unaffected"}], "lessThan": "18.2X75*", "status": "affected", "version": "18.2X75-D5", "versionType": "custom"}]}, {"platforms": ["EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "14.1X53-D47"}]}, {"platforms": ["QFabric System"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"changes": [{"at": "14.1X53-D130", "status": "unaffected"}], "lessThan": "14.1X53*", "status": "affected", "version": "14.1X53-D115", "versionType": "custom"}]}, {"platforms": ["QFX5200/QFX5110"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"changes": [{"at": "15.1X53-D235", "status": "unaffected"}], "lessThan": "15.1X53*", "status": "affected", "version": "15.1X53-D233", "versionType": "custom"}]}, {"platforms": ["NFX150, NFX250"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"changes": [{"at": "15.1X53-D590", "status": "unaffected"}], "lessThanOrEqual": "15.1X53-D471", "status": "affected", "version": "15.1X53", "versionType": "custom"}]}, {"platforms": ["QFX10000 Series"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "15.1X53-D67"}]}, {"platforms": ["EX2300/EX3400"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "15.1X53-D59"}]}, {"platforms": ["All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "17.3R3"}, {"status": "affected", "version": "17.4R2"}, {"changes": [{"at": "17.3R2-S2", "status": "affected"}, {"at": "17.3R2-S4", "status": "unaffected"}], "lessThan": "17.3*", "status": "affected", "version": "17.3R1-S4", "versionType": "custom"}, {"changes": [{"at": "17.4R1-S5", "status": "unaffected"}], "lessThan": "17.4*", "status": "affected", "version": "17.4R1-S3", "versionType": "custom"}, {"changes": [{"at": "18.1R2-S3, 18.1R3", "status": "unaffected"}], "lessThan": "18.1*", "status": "affected", "version": "18.1R2", "versionType": "custom"}, {"changes": [{"at": "18.2R1-S2, 18.2R1-S3, 18.2R2", "status": "unaffected"}], "lessThan": "18.2*", "status": "affected", "version": "18.2R1", "versionType": "custom"}]}], "configurations": [{"lang": "en", "value": "The following minimal protocols configuration is required:\n\n [protocols mpls interface]"}], "datePublic": "2018-10-10T00:00:00", "descriptions": [{"lang": "en", "value": "A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20."}], "exploits": [{"lang": "en", "value": "Juniper SIRT is aware of possible malicious network probing which may have triggered this issue, but not aware of any malicious exploitation of this vulnerability."}], "metrics": [{"cvssV3_0": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"description": "NULL Pointer Dereference", "lang": "en", "type": "text"}]}, {"descriptions": [{"description": "Denial of Service", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-24T09:57:01", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper"}, "references": [{"name": "105701", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/105701"}, {"tags": ["x_refsource_MISC"], "url": "https://kb.juniper.net/KB30092"}, {"name": "1041850", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id/1041850"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://kb.juniper.net/JSA10883"}], "solutions": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.1X46-D81, 12.3R12-S11, 12.3X48-D75, 14.1X53-D130, 14.1X53-D48, 15.1R7-S2, 15.1X49-D150, 5.1X53-D235, 15.1X53-D495, 15.1X53-D68, 15.1X53-D590, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.1X65-D48, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2X75-D101, 17.2X75-D110, 17.3R2-S4, 17.3R3-S1, 17.3R4, 17.4R1-S5, 17.4R2-S1, 17.4R3, 18.1R2-S3, 18.1R3, 18.2R1-S2, 18.2R1-S3, 18.2R2, 18.2X75-D20, 18.3R1, and all subsequent releases.\n\nAdditionally, the following software releases have been re-released to the Juniper download pages to resolve this specific issue:\n12.1X46-D76.1, 12.3X48-D70.4, 14.1X53-D47.6, 15.1F6-S10.11, 15.1R6-S6.2, 15.1R7.9, 15.1X49-D140.3, 15.1X53-D233.2, 15.1X53-D59.4, 15.1X53-D67.6, 16.1R6-S3.2, 16.1R7-S1.2, 16.1R7.8, 17.2X75-D100.6, 17.3R2-S2.2, 17.3R3.10, 17.4R1-S3.4, 18.1R2.6.\n\nNote: The final \".xy\" numeric entry, for example the .4 in 12.3X48-D70.4, on a release in this notice is the respin release number. Customer's should check the respin release number on the version of Junos OS to confirm vulnerability."}], "source": {"advisory": "JSA10883", "defect": ["1380862"], "discovery": "USER"}, "title": "Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash.", "workarounds": [{"lang": "en", "value": "Remove MPLS configuration stanza from interfaces at risk.\nThere are no other available workarounds for this issue."}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2018-10-10T16:00:00.000Z", "ID": "CVE-2018-0049", "STATE": "PUBLIC", "TITLE": "Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash."}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Junos OS", "version": {"version_data": [{"affected": ">=", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "12.1X46", "version_value": "12.1X46-D76"}, {"affected": "<", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "12.1X46", "version_value": "12.1X46-D81"}, {"affected": "=", "version_affected": "=", "version_name": "12.3", "version_value": "12.3R12-S10"}, {"affected": ">=", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "12.3X48", "version_value": "12.3X48-D66"}, {"affected": "<", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "12.3X48", "version_value": "12.3X48-D75"}, {"affected": "=", "platform": "EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100", "version_affected": "=", "version_name": "14.1X53", "version_value": "14.1X53-D47"}, {"affected": ">=", "platform": "QFabric System", "version_affected": ">=", "version_name": "14.1X53", "version_value": "14.1X53-D115"}, {"affected": "<", "platform": "QFabric System", "version_affected": "<", "version_name": "14.1X53", "version_value": "14.1X53-D130"}, {"affected": ">=", "version_affected": ">=", "version_name": "15.1", "version_value": "15.1F6-S10"}, {"affected": "=", "version_affected": "=", "version_name": "15.1", "version_value": "15.1R4-S9"}, {"affected": "=", "version_affected": "=", "version_name": "15.1", "version_value": "15.1R6-S6"}, {"affected": ">=", "version_affected": ">=", "version_name": "15.1", "version_value": "15.1R7"}, {"affected": "<", "version_affected": "<", "version_name": "15.1", "version_value": "15.1R7-S2"}, {"affected": ">=", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "15.1X49", "version_value": "15.1X49-D131"}, {"affected": "<", "platform": "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "15.1X49", "version_value": "15.1X49-D150"}, {"affected": ">", "platform": "QFX5200/QFX5110", "version_affected": ">", "version_name": "15.1X53", "version_value": "15.1X53-D233"}, {"affected": "<", "platform": "QFX5200/QFX5110", "version_affected": "<", "version_name": "15.1X53", "version_value": "15.1X53-D235"}, {"affected": "<=", "platform": "NFX150, NFX250", "version_affected": "<=", "version_name": "15.1X53", "version_value": "15.1X53-D471"}, {"affected": "<", "platform": "NFX150, NFX250", "version_affected": "<", "version_name": "15.1X53", "version_value": "15.1X53-D590"}, {"affected": "=", "platform": "QFX10000 Series", "version_affected": "=", "version_name": "15.1X53", "version_value": "15.1X53-D67"}, {"affected": "=", "platform": "EX2300/EX3400", "version_affected": "=", "version_name": "15.1X53", "version_value": "15.1X53-D59"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.1", "version_value": "16.1R3-S8"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.1", "version_value": "16.1R4-S9"}, {"affected": "<", "version_affected": "<", "version_name": "16.1", "version_value": "16.1R4-S12"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.1", "version_value": "16.1R5-S4"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.1", "version_value": "16.1R6-S3"}, {"affected": "<", "version_affected": "<", "version_name": "16.1", "version_value": "16.1R6-S6"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.1", "version_value": "16.1R7"}, {"affected": "<", "version_affected": "<", "version_name": "16.1", "version_value": "16.1R7-S2"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.2", "version_value": "16.2R1-S6"}, {"affected": ">=", "version_affected": ">=", "version_name": "16.2", "version_value": "16.2R2-S5"}, {"affected": "<", "version_affected": "<", "version_name": "16.2", "version_value": "16.2R2-S7"}, {"affected": "=", "version_affected": "=", "version_name": "17.1", "version_value": "17.1R1-S7"}, {"affected": ">=", "version_affected": ">=", "version_name": "17.1", "version_value": "17.1R2-S7"}, {"affected": "<", "version_affected": "<", "version_name": "17.1", "version_value": "17.1R2-S9"}, {"affected": "=", "version_affected": "=", "version_name": "17.2", "version_value": "17.2R1-S6"}, {"affected": ">=", "version_affected": ">=", "version_name": "17.2", "version_value": "17.2R2-S4"}, {"affected": "<", "version_affected": "<", "version_name": "17.2", "version_value": "17.2R2-S6"}, {"affected": ">=", "version_affected": ">=", "version_name": "17.2X75", "version_value": "17.2X75-D100"}, {"affected": "<", "version_affected": "<", "version_name": "17.2X75", "version_value": "17.2X75-D101, 17.2X75-D110"}, {"affected": ">=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "17.3", "version_value": "17.3R1-S4"}, {"affected": ">=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "17.3", "version_value": "17.3R2-S2"}, {"affected": "<", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "17.3", "version_value": "17.3R2-S4"}, {"affected": "=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "=", "version_name": "17.3", "version_value": "17.3R3"}, {"affected": ">=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "17.4", "version_value": "17.4R1-S3"}, {"affected": "<", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "17.4", "version_value": "17.4R1-S5"}, {"affected": "=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "=", "version_name": "17.4", "version_value": "17.4R2"}, {"affected": ">=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "18.1", "version_value": "18.1R2"}, {"affected": "<", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "18.1", "version_value": "18.1R2-S3, 18.1R3"}, {"affected": ">=", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": ">=", "version_name": "18.2", "version_value": "18.2R1"}, {"affected": "<", "platform": "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX", "version_affected": "<", "version_name": "18.2", "version_value": "18.2R1-S2, 18.2R1-S3, 18.2R2"}, {"affected": ">=", "version_affected": ">=", "version_name": "18.2X75", "version_value": "18.2X75-D5"}, {"affected": "<", "version_affected": "<", "version_name": "18.2X75", "version_value": "18.2X75-D20"}]}}]}, "vendor_name": "Juniper Networks"}]}}, "configuration": [{"lang": "en", "value": "The following minimal protocols configuration is required:\n\n [protocols mpls interface]"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20."}]}, "exploit": [{"lang": "en", "value": "Juniper SIRT is aware of possible malicious network probing which may have triggered this issue, but not aware of any malicious exploitation of this vulnerability."}], "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "NULL Pointer Dereference"}]}, {"description": [{"lang": "eng", "value": "Denial of Service"}]}]}, "references": {"reference_data": [{"name": "105701", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105701"}, {"name": "https://kb.juniper.net/KB30092", "refsource": "MISC", "url": "https://kb.juniper.net/KB30092"}, {"name": "1041850", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041850"}, {"name": "https://kb.juniper.net/JSA10883", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10883"}]}, "solution": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.1X46-D81, 12.3R12-S11, 12.3X48-D75, 14.1X53-D130, 14.1X53-D48, 15.1R7-S2, 15.1X49-D150, 5.1X53-D235, 15.1X53-D495, 15.1X53-D68, 15.1X53-D590, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.1X65-D48, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2X75-D101, 17.2X75-D110, 17.3R2-S4, 17.3R3-S1, 17.3R4, 17.4R1-S5, 17.4R2-S1, 17.4R3, 18.1R2-S3, 18.1R3, 18.2R1-S2, 18.2R1-S3, 18.2R2, 18.2X75-D20, 18.3R1, and all subsequent releases.\n\nAdditionally, the following software releases have been re-released to the Juniper download pages to resolve this specific issue:\n12.1X46-D76.1, 12.3X48-D70.4, 14.1X53-D47.6, 15.1F6-S10.11, 15.1R6-S6.2, 15.1R7.9, 15.1X49-D140.3, 15.1X53-D233.2, 15.1X53-D59.4, 15.1X53-D67.6, 16.1R6-S3.2, 16.1R7-S1.2, 16.1R7.8, 17.2X75-D100.6, 17.3R2-S2.2, 17.3R3.10, 17.4R1-S3.4, 18.1R2.6.\n\nNote: The final \".xy\" numeric entry, for example the .4 in 12.3X48-D70.4, on a release in this notice is the respin release number. Customer's should check the respin release number on the version of Junos OS to confirm vulnerability."}], "source": {"advisory": "JSA10883", "defect": ["1380862"], "discovery": "USER"}, "work_around": [{"lang": "en", "value": "Remove MPLS configuration stanza from interfaces at risk.\nThere are no other available workarounds for this issue."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T03:14:16.501Z"}, "title": "CVE Program Container", "references": [{"name": "105701", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/105701"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://kb.juniper.net/KB30092"}, {"name": "1041850", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id/1041850"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kb.juniper.net/JSA10883"}]}]}, "cveMetadata": {"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2018-0049", "datePublished": "2018-10-10T18:00:00Z", "dateReserved": "2017-11-16T00:00:00", "dateUpdated": "2024-09-17T01:01:10.516Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}