The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Junos OS

computer vulnerability alert CVE-2017-2314

Junos OS: denial of service via BGP OPEN

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2314, JSA10779, VIGILANCE-VUL-23236.

Description of the vulnerability

An attacker can generate a fatal error via BGP OPEN of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2017-2341

Junos OS: privilege escalation via VM

Synthesis of the vulnerability

Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2341, JSA10787, VIGILANCE-VUL-23234.

Description of the vulnerability

An attacker can bypass restrictions via VM of Junos OS, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2017-10605

Junos OS: denial of service via SRX DHCP

Synthesis of the vulnerability

Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-10605, JSA10789, VIGILANCE-VUL-23233.

Description of the vulnerability

An attacker can send malicious SRX DHCP packets to Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2017-2342

Junos OS: vulnerability via MACsec

Synthesis of the vulnerability

Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2342, JSA10790, VIGILANCE-VUL-23232.

Description of the vulnerability

A vulnerability via MACsec of Junos OS was announced.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2017-2343

Junos OS: privilege escalation via SRX UserFW

Synthesis of the vulnerability

Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2343, JSA10791, VIGILANCE-VUL-23231.

Description of the vulnerability

An attacker can bypass restrictions via SRX UserFW of Junos OS, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2017-2344

Junos OS: buffer overflow via Sockets Library

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2344, JSA10792, VIGILANCE-VUL-23230.

Description of the vulnerability

An attacker can generate a buffer overflow via Sockets Library of Junos OS, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2017-2345

Junos OS: denial of service via SNMP

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2345, JSA10793, VIGILANCE-VUL-23229.

Description of the vulnerability

An attacker can send malicious SNMP packets to Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2017-2346

Junos OS: denial of service via MS-MPC

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2346, JSA10794, VIGILANCE-VUL-23228.

Description of the vulnerability

An attacker can generate a fatal error via MS-MPC of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2017-2347

Junos OS: denial of service via rpd

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2347, JSA10795, VIGILANCE-VUL-23227.

Description of the vulnerability

An attacker can generate a fatal error via rpd of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2017-2348

Junos OS: denial of service via jdhcpd

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/07/2017.
Identifiers: CERTFR-2017-AVI-212, CVE-2017-2348, JSA10800, VIGILANCE-VUL-23226.

Description of the vulnerability

An attacker can generate a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Junos OS: