SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos Command Line Interface XML Injection Bug Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1038901
SecurityTracker URL:  http://securitytracker.com/id/1038901
CVE Reference:   CVE-2017-10603   (Links to External Site)
Date:  Jul 13 2017
Impact:   Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Junos. A local user can obtain root privileges on the target system.

A local user can inject XML data via the command line interface (CLI) to execute arbitrary commands on the target system with root privileges.

The vendor has assigned PR 1091037 to this vulnerability.

Impact:   A local user can obtain root privileges on the target system.
Solution:   The vendor has issued a fix (15.1X53-D47, 15.1R3).

The vendor advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10805

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10805 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents

Date:  Thu, 13 Jul 2017 05:28:08 +0000
Subject:  https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10805

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC