Vulnerabilities > CVE-2018-0003 - Unspecified vulnerability in Juniper Junos
Summary
A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D45, 14.1X53-D107; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions prior to 15.1X49-D100; 15.1X53 versions prior to 15.1X53-D65, 15.1X53-D231; 16.1 versions prior to 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2-S1, 16.2R3; 17.1 versions prior to 17.1R2-S2, 17.1R3; 17.2 versions prior to 17.2R1-S3, 17.2R2; 17.2X75 versions prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.
Vulnerable Configurations
Nessus
NASL family | Junos Local Security Checks |
NASL id | JUNIPER_JSA10831.NASL |
description | According to its self-reported version number, the remote Junos device is affected by a denial of service vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 106388 |
published | 2018-01-26 |
reporter | This script is Copyright (C) 2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/106388 |
title | Juniper Junos MPLS Packet Handling Remote DoS (JSA10831) |