ID

VAR-201410-1107


CVE

CVE-2014-3818


TITLE

Juniper Junos Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-004846

DESCRIPTION

Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE. Juniper Junos is prone to a remote denial-of-service vulnerability. Exploiting this issue may allow remote attackers to crash and restart the RPD (Routing Protocol Daemon), causing denial-of-service conditions. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. The following versions are affected: Juniper Junos OS 9.1 to 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11, 12.147-D15, 12.1 before D41 and D62 Version X48, version 12.2 before R8, version 12.2X50 before D70, version 12.3 before R6, version 13.1 before R4-S2, version 13.1X49 before D49, version 13.1X50 before 30, version 13.2 before R4, version 13.2X50 before D20, D25 Version 13.2X51 before D15, version 13.2X52 before D15, version 13.3 before R2, and version 14.1 before R1

Trust: 1.98

sources: NVD: CVE-2014-3818 // JVNDB: JVNDB-2014-004846 // BID: 70361 // VULHUB: VHN-71758

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:12.3

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:13.1x49

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.2x52

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.2x51

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.2

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.1x50

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.2x50

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.2

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:11.4

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.2x50

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:11.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:9.6

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:9.5

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:11.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.4r

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:9.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:11.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:9.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:11.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:9.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.4s

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x48

Trust: 1.0

vendor:junipermodel:junos osscope:eqversion:13.2x52-d15

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.2r8

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.2x50-d70

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2x51-d25

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x44

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.1x49

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.1x50-d30

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:11.4

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1r1

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1r10

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.3

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x46-d30

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x44-d40

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2x50

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.3r2

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.1x50

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x46

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.2

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2x52

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x47-d11 12.1x47-d15

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x47

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x48

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x48-d41 12.1x48-d62

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:9.1 from 11.4r11

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.2x50

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3r6

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2x51

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.1x49-d49

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.1r4-s2

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2r4

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2x50-d20

Trust: 0.8

vendor:junipermodel:junos 13.3r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x50-d15.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.2x50-d50.1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.2x50-d40.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.2r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.2r1.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1rscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r10.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r10-s1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r1.6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x52-d15scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x50-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2r4scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.1x50-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.1x49-d49scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.1r4-s2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.2x50-d70scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.2r8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x48-d62scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x48-d41scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1r10scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r11scope:neversion: -

Trust: 0.3

sources: BID: 70361 // JVNDB: JVNDB-2014-004846 // CNNVD: CNNVD-201410-258 // NVD: CVE-2014-3818

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3818
value: HIGH

Trust: 1.0

NVD: CVE-2014-3818
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201410-258
value: HIGH

Trust: 0.6

VULHUB: VHN-71758
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3818
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-71758
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71758 // JVNDB: JVNDB-2014-004846 // CNNVD: CNNVD-201410-258 // NVD: CVE-2014-3818

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-71758 // JVNDB: JVNDB-2014-004846 // NVD: CVE-2014-3818

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-258

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201410-258

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004846

PATCH

title:JSA10653url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10653

Trust: 0.8

sources: JVNDB: JVNDB-2014-004846

EXTERNAL IDS

db:NVDid:CVE-2014-3818

Trust: 2.8

db:JUNIPERid:JSA10653

Trust: 2.0

db:SECTRACKid:1031009

Trust: 1.1

db:JVNDBid:JVNDB-2014-004846

Trust: 0.8

db:CNNVDid:CNNVD-201410-258

Trust: 0.7

db:BIDid:70361

Trust: 0.4

db:VULHUBid:VHN-71758

Trust: 0.1

sources: VULHUB: VHN-71758 // BID: 70361 // JVNDB: JVNDB-2014-004846 // CNNVD: CNNVD-201410-258 // NVD: CVE-2014-3818

REFERENCES

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10653

Trust: 1.6

url:http://www.securitytracker.com/id/1031009

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3818

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3818

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10653&cat=sirt_1&actp=list

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10653

Trust: 0.1

sources: VULHUB: VHN-71758 // BID: 70361 // JVNDB: JVNDB-2014-004846 // CNNVD: CNNVD-201410-258 // NVD: CVE-2014-3818

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 70361

SOURCES

db:VULHUBid:VHN-71758
db:BIDid:70361
db:JVNDBid:JVNDB-2014-004846
db:CNNVDid:CNNVD-201410-258
db:NVDid:CVE-2014-3818

LAST UPDATE DATE

2025-04-13T23:21:24.583000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71758date:2015-11-05T00:00:00
db:BIDid:70361date:2014-10-09T00:00:00
db:JVNDBid:JVNDB-2014-004846date:2015-12-02T00:00:00
db:CNNVDid:CNNVD-201410-258date:2014-10-16T00:00:00
db:NVDid:CVE-2014-3818date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-71758date:2014-10-14T00:00:00
db:BIDid:70361date:2014-10-09T00:00:00
db:JVNDBid:JVNDB-2014-004846date:2014-10-20T00:00:00
db:CNNVDid:CNNVD-201410-258date:2014-10-15T00:00:00
db:NVDid:CVE-2014-3818date:2014-10-14T14:55:05.007