CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2014-9425 Juniper JUNOS J-Web: Multiple Vulnerabilities (JSA10804)

2017年8月29日 1195点热度 0人点赞 0条评论

漏洞类别:Hardware

漏洞等级:

漏洞信息

Juniper JUNOS is the network operating system used in Juniper Networks hardware systems.

The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.(CVE-2013-6420)
Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.(CVE-2014-9425)
ext/xml/xml.c in PHP does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.(CVE-2013-4113)
The SQLite functionality in PHP allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.(CVE-2012-3365)

Affected Version
Junos OS 12.1X46 prior to 12.1X46-D65, 12.1X47 prior to 12.1X47-D40, 12.1X47-D45; 12.3 prior to 12.3R12-S5; 12.3X48 prior to 12.3X48-D35; 14.2 prior to 14.2R8; 15.1 prior to 15.1R4; 15.1X49 prior to 15.1X49-D50.

漏洞危害

On successful exploitation it allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.(CVE-2013-6420)

解决方案

The following software releases have been updated to resolve this specific issue: 12.1X46-D65, 12.1X47-D40, 12.1X47-D45, 12.3R12-S5, 12.3X48-D35, 14.2R8, 15.1R4, 15.1X49-D50, 16.1R1, 16.1R1, 16.1R2, and all subsequent releases.

Workaround:
Methods which may reduce, but not eliminate, the risk for exploitation of this problem, and which does not mitigate or resolve the underlying problem include:

a. Using access lists or firewall filters to limit access to the device only from trusted hosts.
b. Disabling J-Web
c. Limit access to J-Web from only trusted networks

Patch:
Following are links for downloading patches to fix the vulnerabilities:

JSA10804: junos

0daybank

标签: 暂无
最后更新:2017年8月29日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me