Versio.io

CVE-2019-0037

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-04-2019 10:29
Last modified: - 18-04-2022 07:32
Total changes: - 3

Description

In a Dynamic Host Configuration Protocol version 6 (DHCPv6) environment, the jdhcpd daemon may crash and restart upon receipt of certain DHCPv6 solicit messages received from a DHCPv6 client. By continuously sending the same crafted packet, an attacker can repeatedly crash the jdhcpd process causing a sustained Denial of Service (DoS) to both IPv4 and IPv6 clients. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496; 16.1 versions prior to 16.1R3-S10, 16.1R7-S4; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S2; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=juniper AND product=junos AND version=15.1 AND update=r2
vendor=juniper AND product=junos AND version=15.1 AND update=r7
vendor=juniper AND product=junos AND version=15.1 AND update=r3
vendor=juniper AND product=junos AND version=15.1 AND update=r4
vendor=juniper AND product=junos AND version=15.1 AND update=r5
vendor=juniper AND product=junos AND version=15.1 AND update=r6
vendor=juniper AND product=junos AND version=15.1 AND update=r1
OR
vendor=juniper AND product=junos AND version=15.1x49-d30
vendor=juniper AND product=junos AND version=15.1x49-d140
vendor=juniper AND product=junos AND version=15.1x49-d150
vendor=juniper AND product=junos AND version=15.1x49-d160
vendor=juniper AND product=junos AND version=15.1x49-d60
OR
vendor=juniper AND product=junos AND version=15.1x53-d51
vendor=juniper AND product=junos AND version=15.1x53-d55
vendor=juniper AND product=junos AND version=15.1x53-d57
vendor=juniper AND product=junos AND version=15.1x53-d58
vendor=juniper AND product=junos AND version=15.1x53-d59
vendor=juniper AND product=junos AND version=15.1x53-d50
vendor=juniper AND product=junos AND version=15.1x53-d52
OR
vendor=juniper AND product=junos AND version=16 AND update=r2
vendor=juniper AND product=junos AND version=16 AND update=r3
vendor=juniper AND product=junos AND version=16 AND update=r4
vendor=juniper AND product=junos AND version=16 AND update=r5
vendor=juniper AND product=junos AND version=16 AND update=r6
vendor=juniper AND product=junos AND version=16 AND update=r7
OR
vendor=juniper AND product=junos AND version=16.2 AND update=r2
vendor=juniper AND product=junos AND version=16.2 AND update=r2-s7
vendor=juniper AND product=junos AND version=16.2 AND update=r1
OR
vendor=juniper AND product=junos AND version=17.1 AND update=r1
vendor=juniper AND product=junos AND version=17.1 AND update=r2
OR
vendor=juniper AND product=junos AND version=17.1 AND update=r2-s9
OR
vendor=juniper AND product=junos AND version=17.2 AND update=r2
vendor=juniper AND product=junos AND version=17.2 AND update=r3
vendor=juniper AND product=junos AND version=17.2 AND update=r1
OR
vendor=juniper AND product=junos AND version=17.2 AND update=r1-s7
OR
vendor=juniper AND product=junos AND version=17.3 AND update=r1
vendor=juniper AND product=junos AND version=17.3 AND update=r3
vendor=juniper AND product=junos AND version=17.3 AND update=r2
vendor=juniper AND product=junos AND version=17.3 AND update=r3-s2
OR
vendor=juniper AND product=junos AND version=17.4 AND update=r1
vendor=juniper AND product=junos AND version=17.4 AND update=r1-s5
vendor=juniper AND product=junos AND version=17.4 AND update=r2
OR
vendor=juniper AND product=junos AND version=18.1 AND update=r1
vendor=juniper AND product=junos AND version=18.1 AND update=r3
vendor=juniper AND product=junos AND version=18.1 AND update=r2
vendor=juniper AND product=junos AND version=18.1 AND update=r3-s1
OR
vendor=juniper AND product=junos AND version=18.2 AND update=r1
OR
vendor=juniper AND product=junos AND version=18.2x75-d10
OR
vendor=juniper AND product=junos AND version=18.3 AND update=r1
vendor=juniper AND product=junos AND version=18.3 AND update=r1-s1
 

Reference

 


Keywords

NVD

 

CVE-2019-0037

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.