SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos LLDP Processing Flaw Lets Remote Users Deny Service and Remote Authenticated Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040181
SecurityTracker URL:  http://securitytracker.com/id/1040181
CVE Reference:   CVE-2018-0007   (Links to External Site)
Date:  Jan 13 2018
Impact:   Denial of service via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 12.1X46, 12.3, 12.3X48, 14.1, 14.1X53, 14.2, 15.1, 15.1X49, 15.1X53, 16.1, 16.1X65, 16.2, 17.1
Description:   Some vulnerabilities were reported in Juniper Junos. A remote user can cause denial of service conditions on the target system. A remote authenticated user can gain elevated privileges.

A remote user can send specially crafted LLDP packets via a local segment broadcast to trigger a memory corruption error and cause denial of service conditions.

A remote authenticated user can send specially crafted LLDP packets to gain elevated privileges and take control of the target system.

A remote user can send specially crafted LLDP packets via an LLDP proxy through local segment broadcast(s) to trigger a memory corruption error and cause denial of service conditions that may cascade to adjacent devices.

Systems that support running LLDP daemons are affected.

The vendor has assigned PR 1252823 to these vulnerabilities.

UK's National Cyber Security Centre (NCSC) reported these vulnerabilities.

Impact:   A remote user can cause denial of service conditions.

A remote authenticated user can gain elevated privileges on the target system.

Solution:   The vendor has issued a fix (12.1X46-D71, 12.3X48-D55, 12.3R12-S7, 12.3X48-D55, 14.1R8-S5, 14.1R9, 14.1X53-D46, 14.1X53-D50, 14.2R7-S9, 14.2R8, 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R7, 15.1X49-D90, 15.1X53-D65, 16.1R4-S6, 16.1R5, 16.1X65-D45, 16.2R2, 17.1R2, 17.2R1).

The vendor advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10830

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10830 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC