CVE-2017-10602CVE-2017-10602

Affected configuration(s):

cpe:/o:juniper:junos:14.1×53
cpe:/o:juniper:junos:14.2
cpe:/o:juniper:junos:14.2:r1
cpe:/o:juniper:junos:14.2:r2
cpe:/o:juniper:junos:14.2:r3
cpe:/o:juniper:junos:14.2:r4
cpe:/o:juniper:junos:14.2:r5
cpe:/o:juniper:junos:15.1
cpe:/o:juniper:junos:15.1:a1
cpe:/o:juniper:junos:15.1:f1
cpe:/o:juniper:junos:15.1:f2
cpe:/o:juniper:junos:15.1:f2-s1
cpe:/o:juniper:junos:15.1:f2-s2
cpe:/o:juniper:junos:15.1:f2-s3
cpe:/o:juniper:junos:15.1:f2-s4
cpe:/o:juniper:junos:15.1:f3
cpe:/o:juniper:junos:15.1:f4
cpe:/o:juniper:junos:15.1:f6
cpe:/o:juniper:junos:15.1:r3
cpe:/o:juniper:junos:15.1×49
cpe:/o:juniper:junos:15.1×49-d10
cpe:/o:juniper:junos:15.1×49-d20
cpe:/o:juniper:junos:15.1×49-d30
cpe:/o:juniper:junos:15.1×49-d35
cpe:/o:juniper:junos:15.1×53:d10
cpe:/o:juniper:junos:15.1×53:d20
cpe:/o:juniper:junos:15.1×53:d21
cpe:/o:juniper:junos:15.1×53:d25
cpe:/o:juniper:junos:15.1×53:d30
cpe:/o:juniper:junos:15.1×53:d32
cpe:/o:juniper:junos:15.1×53:d33
cpe:/o:juniper:junos:15.1×53:d34
cpe:/o:juniper:junos:15.1×53:d40
cpe:/o:juniper:junos:15.1×53:d45
cpe:/o:juniper:junos:15.1×53:d70

Date published: 2017-07-17T09:18:18.657-04:00

Date last modified: 2017-08-16T21:34:29.120-04:00

CVSS Score: 7.2

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://www.securityfocus.com/bid/100323

Summary: A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only privileges and access to Junos CLI, to execute code with root privileges. Affected releases are Juniper Networks Junos OS 14.1X53; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1F6, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D47, 15.1X53-D70. This issue does not affect Junos 14.1 or prior releases. No other Juniper Networks products or platforms are affected by this issue.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.