A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affected Juniper Networks Junos OS releases are: 14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D50 on EX and QFX series; 14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8; No other Junos OS releases are affected by this issue. No other Juniper Networks products are affected by this issue.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10818 | Vendor Advisory |
http://www.securitytracker.com/id/1040039 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Information
Published : 2017-10-13 10:29
Updated : 2018-01-04 18:31
NVD link : CVE-2017-10615
Mitre link : CVE-2017-10615
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
juniper
- ex4550
- ex3200
- ex4200
- ex4500-vc
- ex4300
- ex3300
- ex8200-vc
- junos
- ex4600
- ex4300-vc
- ex4200-vc
- ex6200
- ex4550-vc
- ex8200
- ex3300-vc
- ex4500
- ex4600-vc