A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10828 | Mitigation Patch Vendor Advisory |
http://www.securitytracker.com/id/1040180 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/103092 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Information
Published : 2018-01-10 14:29
Updated : 2018-02-22 18:29
NVD link : CVE-2018-0001
Mitre link : CVE-2018-0001
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
juniper
- junos