SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos Command Line Interface Bugs Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1037013
SecurityTracker URL:  http://securitytracker.com/id/1037013
CVE Reference:   CVE-2016-4922   (Links to External Site)
Date:  Oct 14 2016
Impact:   Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Junos. A local user can obtain elevated privileges on the target system.

A local user can supply specially crafted command line interface commands and arguments to execute arbitrary commands on the operating system with elevated privileges to gain full control of the target device.

The vendor has assigned PRs 1027807, 1117227, and 1061973 to this vulnerability.

Impact:   A local user can obtain elevated privileges and full control of the target system.
Solution:   The vendor has issued a fix (12.1X46-D60, 12.1X47-D45, 12.3R12, 12.3X48-D35, 13.2R9, 13.3R9, 14.1R7, 14.1X53-D40, 14.1X55-D35, 14.2R5, 15.1F4, 15.1R3, 15.1X49-D60, 15.1X53-D70, 16.1R1).

The vendor advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10763

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10763 (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC