ID

VAR-201404-0634


CVE

CVE-2014-2714


TITLE

Juniper SRX Used in series service gateways Juniper Junos Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-002021

DESCRIPTION

The Enhanced Web Filtering (EWF) in Juniper Junos before 10.4R15, 11.4 before 11.4R9, 12.1 before 12.1R7, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D10, and 12.1X46 before 12.1X46-D10, as used in the SRX Series services gateways, allows remote attackers to cause a denial of service (flow daemon crash and restart) via a crafted URL. Juniper Junos is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Juniper Networks Juniper Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. The following versions are affected: Juniper Networks Junos 10.4, 11.4, 12.1x44, 12.1x45, 12.1x46, 12.1

Trust: 1.98

sources: NVD: CVE-2014-2714 // JVNDB: JVNDB-2014-002021 // BID: 66760 // VULHUB: VHN-70653

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:12.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:11.4

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x45

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:10.4

Trust: 1.6

vendor:junipermodel:junos osscope:ltversion:12.1x45

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:11.4r9

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x45-d10

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x46

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x44

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x46-d10

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x44-d20

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:11.4

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1r7

Trust: 0.8

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x45-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 10.4r15scope: - version: -

Trust: 0.3

sources: BID: 66760 // JVNDB: JVNDB-2014-002021 // CNNVD: CNNVD-201404-191 // NVD: CVE-2014-2714

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2714
value: HIGH

Trust: 1.0

NVD: CVE-2014-2714
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201404-191
value: HIGH

Trust: 0.6

VULHUB: VHN-70653
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2714
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-70653
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-70653 // JVNDB: JVNDB-2014-002021 // CNNVD: CNNVD-201404-191 // NVD: CVE-2014-2714

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70653 // JVNDB: JVNDB-2014-002021 // NVD: CVE-2014-2714

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-191

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201404-191

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002021

PATCH

title:JSA10622url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10622

Trust: 0.8

sources: JVNDB: JVNDB-2014-002021

EXTERNAL IDS

db:NVDid:CVE-2014-2714

Trust: 2.8

db:SECUNIAid:57835

Trust: 2.5

db:BIDid:66760

Trust: 2.0

db:JUNIPERid:JSA10622

Trust: 2.0

db:SECTRACKid:1030060

Trust: 1.7

db:JVNDBid:JVNDB-2014-002021

Trust: 0.8

db:CNNVDid:CNNVD-201404-191

Trust: 0.7

db:VULHUBid:VHN-70653

Trust: 0.1

sources: VULHUB: VHN-70653 // BID: 66760 // JVNDB: JVNDB-2014-002021 // CNNVD: CNNVD-201404-191 // NVD: CVE-2014-2714

REFERENCES

url:http://secunia.com/advisories/57835

Trust: 3.1

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10622

Trust: 1.9

url:http://www.securityfocus.com/bid/66760

Trust: 1.7

url:http://securitytracker.com/id?1030060

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2714

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2714

Trust: 0.8

url:http://secunia.com/advisories/57835/

Trust: 0.8

url:http://www.juniper.net

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10622

Trust: 0.1

sources: VULHUB: VHN-70653 // BID: 66760 // JVNDB: JVNDB-2014-002021 // CNNVD: CNNVD-201404-191 // NVD: CVE-2014-2714

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 66760

SOURCES

db:VULHUBid:VHN-70653
db:BIDid:66760
db:JVNDBid:JVNDB-2014-002021
db:CNNVDid:CNNVD-201404-191
db:NVDid:CVE-2014-2714

LAST UPDATE DATE

2025-04-13T23:37:39.914000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-70653date:2014-04-15T00:00:00
db:BIDid:66760date:2014-04-09T00:00:00
db:JVNDBid:JVNDB-2014-002021date:2014-04-16T00:00:00
db:CNNVDid:CNNVD-201404-191date:2014-04-17T00:00:00
db:NVDid:CVE-2014-2714date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-70653date:2014-04-14T00:00:00
db:BIDid:66760date:2014-04-09T00:00:00
db:JVNDBid:JVNDB-2014-002021date:2014-04-16T00:00:00
db:CNNVDid:CNNVD-201404-191date:2014-04-17T00:00:00
db:NVDid:CVE-2014-2714date:2014-04-14T15:09:06.413