ID

VAR-201705-3365


CVE

CVE-2017-2301


TITLE

Juniper Networks Run on products and platforms Junos OS Data processing vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-004631

DESCRIPTION

On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prior to 15.1F6 or 15.1R3, 15.1X49 prior to 15.1X49-D60, 15.1X53 prior to 15.1X53-D30 and DHCPv6 enabled, when a crafted DHCPv6 packet is received from a subscriber, jdhcpd daemon crashes and restarts. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. Juniper Networks Run on products and platforms Junos OS Is DHCPv6 Data processing vulnerabilities exist when is enabled.Service operation interruption (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash and restart the affected device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK

Trust: 2.07

sources: NVD: CVE-2017-2301 // JVNDB: JVNDB-2017-004631 // BID: 95396 // VULHUB: VHN-110504 // VULMON: CVE-2017-2301

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:13.2x51

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.1x53

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.1x55

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1x53

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:11.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.2

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

vendor:junipermodel:junosscope:eqversion:13.3r9

Trust: 0.6

vendor:junipermodel:junosscope:eqversion:14.2r6

Trust: 0.6

vendor:junipermodel:junosscope:eqversion:15.1r2

Trust: 0.6

vendor:junipermodel:junosscope:eqversion:14.1r7

Trust: 0.6

vendor:junipermodel:junosscope:eqversion:16.1

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x55-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x55-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d39scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r12scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d55scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d51scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d46scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d37scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r13-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r13-s1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 11.4r13scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 16.1r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d60scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x55-d35scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d35scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d12scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.3r10scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r13scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r12-s2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d60scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r13-s3scope:neversion: -

Trust: 0.3

sources: BID: 95396 // JVNDB: JVNDB-2017-004631 // CNNVD: CNNVD-201701-320 // NVD: CVE-2017-2301

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2301
value: HIGH

Trust: 1.0

NVD: CVE-2017-2301
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201701-320
value: HIGH

Trust: 0.6

VULHUB: VHN-110504
value: HIGH

Trust: 0.1

VULMON: CVE-2017-2301
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2301
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-110504
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2301
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110504 // VULMON: CVE-2017-2301 // JVNDB: JVNDB-2017-004631 // CNNVD: CNNVD-201701-320 // NVD: CVE-2017-2301

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-19

Trust: 0.9

sources: VULHUB: VHN-110504 // JVNDB: JVNDB-2017-004631 // NVD: CVE-2017-2301

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-320

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201701-320

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004631

PATCH

title:JSA10769url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10769&actp=METADATA

Trust: 0.8

title:Juniper Junos Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66982

Trust: 0.6

sources: JVNDB: JVNDB-2017-004631 // CNNVD: CNNVD-201701-320

EXTERNAL IDS

db:NVDid:CVE-2017-2301

Trust: 2.9

db:BIDid:95396

Trust: 2.1

db:JUNIPERid:JSA10769

Trust: 2.1

db:SECTRACKid:1037596

Trust: 1.8

db:JVNDBid:JVNDB-2017-004631

Trust: 0.8

db:CNNVDid:CNNVD-201701-320

Trust: 0.7

db:VULHUBid:VHN-110504

Trust: 0.1

db:VULMONid:CVE-2017-2301

Trust: 0.1

sources: VULHUB: VHN-110504 // VULMON: CVE-2017-2301 // BID: 95396 // JVNDB: JVNDB-2017-004631 // CNNVD: CNNVD-201701-320 // NVD: CVE-2017-2301

REFERENCES

url:http://www.securityfocus.com/bid/95396

Trust: 2.4

url:https://kb.juniper.net/jsa10769

Trust: 1.8

url:http://www.securitytracker.com/id/1037596

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2301

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2301

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://www.juniper.net/us/en/products-services/nos/junos/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10769&actp=rss

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/juniper-junos-os-jsa10769

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=52320

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-110504 // VULMON: CVE-2017-2301 // BID: 95396 // JVNDB: JVNDB-2017-004631 // CNNVD: CNNVD-201701-320 // NVD: CVE-2017-2301

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 95396

SOURCES

db:VULHUBid:VHN-110504
db:VULMONid:CVE-2017-2301
db:BIDid:95396
db:JVNDBid:JVNDB-2017-004631
db:CNNVDid:CNNVD-201701-320
db:NVDid:CVE-2017-2301

LAST UPDATE DATE

2025-04-20T23:27:24.699000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110504date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-2301date:2019-10-03T00:00:00
db:BIDid:95396date:2017-01-23T00:05:00
db:JVNDBid:JVNDB-2017-004631date:2017-07-03T00:00:00
db:CNNVDid:CNNVD-201701-320date:2019-10-23T00:00:00
db:NVDid:CVE-2017-2301date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-110504date:2017-05-30T00:00:00
db:VULMONid:CVE-2017-2301date:2017-05-30T00:00:00
db:BIDid:95396date:2017-01-11T00:00:00
db:JVNDBid:JVNDB-2017-004631date:2017-07-03T00:00:00
db:CNNVDid:CNNVD-201701-320date:2017-01-13T00:00:00
db:NVDid:CVE-2017-2301date:2017-05-30T14:29:00.647