SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos Buffer Overflow in Internal Sockets Library Lets Local Users Deny Service or Obtain Elevated Privileges
SecurityTracker Alert ID:  1038896
SecurityTracker URL:  http://securitytracker.com/id/1038896
CVE Reference:   CVE-2017-2344   (Links to External Site)
Date:  Jul 13 2017
Impact:   Denial of service via local system, Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Junos. A local user can cause denial of service conditions on the target system. A local user can obtain elevated privileges on the target system.

A local user can that can run a specially crafted application on the target system can trigger a buffer overflow in an internal Junos OS sockets library and cause a kernel panic or cause arbitrary code to be executed with elevated privileges.

[Editor's note: The vendor indicates that there are no known exploit methods using signed binaries that ship with the product. The vendor also indicates that 'veriexec' restricts arbitrary binaries from running on the device.]

The vendor has assigned PR 1282562 to this vulnerability.

Impact:   A local user can cause denial of service conditions on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix (12.1X46-D67, 12.3X48-D51, 12.3X48-D55, 13.3R10-S2, 14.1R2-S10, 14.1R8-S4, 14.1R9, 14.1X53-D122, 14.1X53-D45, 14.1X53-D50, 14.2R7-S7, 14.2R8, 15.1F2-S18, 15.1F6-S7, 15.1R4-S8, 15.1R5-S5, 15.1R6-S1, 15.1R7, 15.1X49-D100, 15.1X53-D231, 15.1X53-D47, 15.1X53-D48, 15.1X53-D57, 15.1X53-D64, 15.1X53-D70, 16.1R3-S4, 16.1R4-S3, 16.1R4-S4, 16.1R5, 16.2R2, 17.1R1-S3, 17.1R2, 17.2R1-S1, 17.2R2, 17.3R1).

The vendor advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10792

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10792 (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents

Subject:  https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10792

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC