ID

VAR-201704-0736


CVE

CVE-2017-2316


TITLE

Juniper Networks NorthStar Controller Application Buffer Overflow Vulnerability

Trust: 1.4

sources: CNVD: CNVD-2017-07223 // JVNDB: JVNDB-2017-003342

DESCRIPTION

A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service. JuniperNetworksNorthStarControllerApplication is a traffic planning controller from Juniper Networks. The controller optimizes the service provider's transport network by establishing an open industry standard protocol. An attacker could exploit the vulnerability to cause a denial of service. Juniper NorthStar Controller Application is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to crash the affected application, resulting in denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed

Trust: 2.52

sources: NVD: CVE-2017-2316 // JVNDB: JVNDB-2017-003342 // CNVD: CNVD-2017-07223 // BID: 97601 // VULHUB: VHN-110519

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-07223

AFFECTED PRODUCTS

vendor:junipermodel:northstar controllerscope:lteversion:2.1.0

Trust: 1.0

vendor:junipermodel:northstar controllerscope:ltversion:2.1.0 service pack 1

Trust: 0.8

vendor:junipermodel:networks northstar controller application service packscope:ltversion:2.1.01

Trust: 0.6

vendor:junipermodel:northstar controllerscope:eqversion:2.1.0

Trust: 0.6

vendor:junipermodel:northstar controller applicationscope:eqversion:2.1.0

Trust: 0.3

vendor:junipermodel:northstar controller application service packscope:neversion:2.1.01

Trust: 0.3

sources: CNVD: CNVD-2017-07223 // BID: 97601 // JVNDB: JVNDB-2017-003342 // CNNVD: CNNVD-201704-996 // NVD: CVE-2017-2316

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2316
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-2316
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-07223
value: LOW

Trust: 0.6

CNNVD: CNNVD-201704-996
value: LOW

Trust: 0.6

VULHUB: VHN-110519
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-2316
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-07223
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-110519
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2316
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.0
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-07223 // VULHUB: VHN-110519 // JVNDB: JVNDB-2017-003342 // CNNVD: CNNVD-201704-996 // NVD: CVE-2017-2316

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-110519 // JVNDB: JVNDB-2017-003342 // NVD: CVE-2017-2316

THREAT TYPE

local

Trust: 0.9

sources: BID: 97601 // CNNVD: CNNVD-201704-996

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201704-996

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003342

PATCH

title:JSA10783url:https://kb.juniper.net/JSA10783

Trust: 0.8

title:JuniperNetworksNorthStarControllerApplication Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/94106

Trust: 0.6

title:Juniper Networks NorthStar Controller Application Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70260

Trust: 0.6

sources: CNVD: CNVD-2017-07223 // JVNDB: JVNDB-2017-003342 // CNNVD: CNNVD-201704-996

EXTERNAL IDS

db:NVDid:CVE-2017-2316

Trust: 3.4

db:JUNIPERid:JSA10783

Trust: 2.6

db:BIDid:97601

Trust: 2.6

db:JVNDBid:JVNDB-2017-003342

Trust: 0.8

db:CNNVDid:CNNVD-201704-996

Trust: 0.7

db:CNVDid:CNVD-2017-07223

Trust: 0.6

db:VULHUBid:VHN-110519

Trust: 0.1

sources: CNVD: CNVD-2017-07223 // VULHUB: VHN-110519 // BID: 97601 // JVNDB: JVNDB-2017-003342 // CNNVD: CNNVD-201704-996 // NVD: CVE-2017-2316

REFERENCES

url:http://www.securityfocus.com/bid/97601

Trust: 2.3

url:https://kb.juniper.net/jsa10783

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2316

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2316

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10783&cat=sirt_1&actp=list

Trust: 0.3

sources: CNVD: CNVD-2017-07223 // VULHUB: VHN-110519 // BID: 97601 // JVNDB: JVNDB-2017-003342 // CNNVD: CNNVD-201704-996 // NVD: CVE-2017-2316

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 97601

SOURCES

db:CNVDid:CNVD-2017-07223
db:VULHUBid:VHN-110519
db:BIDid:97601
db:JVNDBid:JVNDB-2017-003342
db:CNNVDid:CNNVD-201704-996
db:NVDid:CVE-2017-2316

LAST UPDATE DATE

2025-04-20T19:38:54.162000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-07223date:2017-05-23T00:00:00
db:VULHUBid:VHN-110519date:2017-04-27T00:00:00
db:BIDid:97601date:2017-04-18T00:05:00
db:JVNDBid:JVNDB-2017-003342date:2017-05-25T00:00:00
db:CNNVDid:CNNVD-201704-996date:2017-05-17T00:00:00
db:NVDid:CVE-2017-2316date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-07223date:2017-05-22T00:00:00
db:VULHUBid:VHN-110519date:2017-04-24T00:00:00
db:BIDid:97601date:2017-04-12T00:00:00
db:JVNDBid:JVNDB-2017-003342date:2017-05-25T00:00:00
db:CNNVDid:CNNVD-201704-996date:2017-04-12T00:00:00
db:NVDid:CVE-2017-2316date:2017-04-24T15:59:00.300