#VU7533 Buffer overflow in Juniper Junos OS - CVE-2017-2344

 

#VU7533 Buffer overflow in Juniper Junos OS - CVE-2017-2344

Published: July 14, 2017


Vulnerability identifier: #VU7533
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-2344
CWE-ID: CWE-120
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Juniper Junos OS
Software vendor:
Juniper Networks, Inc.

Description

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the system.

The weakness exists due to buffer overflow in an internal Junos OS sockets library. A local attacker can run a specially crafted application, trigger memory corruption, cause the kernel panic or execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

The vulnerability is addressed in the following versions:
12.1X46-D67, 12.3X48-D51, 12.3X48-D55, 13.3R10-S2, 14.1R2-S10, 14.1R8-S4, 14.1R9, 14.1X53-D122, 14.1X53-D45, 14.1X53-D50, 14.2R7-S7, 14.2R8, 15.1F2-S18, 15.1F6-S7, 15.1R4-S8, 15.1R5-S5, 15.1R6-S1, 15.1R7, 15.1X49-D100, 15.1X53-D231, 15.1X53-D47, 15.1X53-D48, 15.1X53-D57, 15.1X53-D64, 15.1X53-D70, 16.1R3-S4, 16.1R4-S3, 16.1R4-S4, 16.1R5, 16.2R2, 17.1R1-S3, 17.1R2, 17.2R1-S1, 17.2R2, 17.3R1.

External links