#VU11843 Improper input validation in Juniper Junos OS - CVE-2018-0020
Published: April 16, 2018 / Updated: April 17, 2018
Vulnerability identifier: #VU11843
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0020
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Juniper Junos OS
Juniper Junos OS
Software vendor:
Juniper Networks, Inc.
Juniper Networks, Inc.
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in rpd daemon cores due to unspecified flaw. A remote attacker can submit a specially crafted BGP UPDATE and cause the service to crash.
The weakness exists in rpd daemon cores due to unspecified flaw. A remote attacker can submit a specially crafted BGP UPDATE and cause the service to crash.
Remediation
Update to versions 14.1X53-D47, 15.1F6-S10, 15.1R4-S9, 15.1R6-S6, 15.1R7, 15.1X49-D130, 15.1X53-D233, 15.1X53-D471, 15.1X53-D58, 15.1X53-D66, 16.1R3-S8, 16.1R4-S9, 16.1R5-S3, 16.1R6-S3, 16.1R7, 16.1X65-D47, 16.2R1-S6, 16.2R2-S5, 16.2R3, 17.1R2-S3, 17.1R3, 17.2R1-S3, 17.2R2-S1, 17.2R3, 17.2X75-D70, 17.3R1 or later.