Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10773 | Vendor Advisory |
http://www.securityfocus.com/bid/95403 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037593 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-05-30 07:29
Updated : 2019-05-10 07:11
NVD link : CVE-2017-2304
Mitre link : CVE-2017-2304
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
juniper
- ex4300
- junos
- ex4600
- qfx5100
- qfx3600
- qfx5200
- qfx3500