CVE-2018-0026
CVSSN/A
发布时间 :2018-07-11 14:29:00
修订时间 :2018-07-13 21:29:01
NMS    

[原文]After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME-<interface_name> This issue affects firewall filters for every address family. Affected releases are Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 and SRs based on these MRs. 15.1X8 versions prior to 15.1X8.3.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0026
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0026
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/104720
(UNKNOWN)  BID  104720
https://kb.juniper.net/JSA10859
(UNKNOWN)  CONFIRM  https://kb.juniper.net/JSA10859

- 漏洞信息

Juniper Junos CVE-2018-0026 Security Bypass Vulnerability
Configuration Error 104720
Yes No
2018-07-11 12:00:00 2018-07-11 12:00:00
The vendor reported this issue.

- 受影响的程序版本

Juniper Junos 15.1X8
Juniper Junos 15.1R6
Juniper Junos 15.1R5
Juniper Junos 15.1R4
,Juniper Junos 15.1X8.3
Juniper Junos 15.1R7

- 不受影响的程序版本

Juniper Junos 15.1X8.3
Juniper Junos 15.1R7

- 漏洞讨论

Juniper Junos is prone to a security-bypass vulnerability.

An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站