CVE-2021-0271
22.04.2021, 20:15
A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 12.3 |
juniper | junos | 12.3:r1 |
juniper | junos | 12.3:r10 |
juniper | junos | 12.3:r10-s1 |
juniper | junos | 12.3:r10-s2 |
juniper | junos | 12.3:r11 |
juniper | junos | 12.3:r12 |
juniper | junos | 12.3:r12-s1 |
juniper | junos | 12.3:r12-s10 |
juniper | junos | 12.3:r12-s11 |
juniper | junos | 12.3:r12-s12 |
juniper | junos | 12.3:r12-s13 |
juniper | junos | 12.3:r12-s14 |
juniper | junos | 12.3:r12-s15 |
juniper | junos | 12.3:r12-s16 |
juniper | junos | 12.3:r12-s3 |
juniper | junos | 12.3:r12-s4 |
juniper | junos | 12.3:r12-s6 |
juniper | junos | 12.3:r12-s8 |
juniper | junos | 15.1 |
juniper | junos | 15.1:a1 |
juniper | junos | 15.1:f |
juniper | junos | 15.1:f1 |
juniper | junos | 15.1:f2 |
juniper | junos | 15.1:f2-s1 |
juniper | junos | 15.1:f2-s2 |
juniper | junos | 15.1:f2-s3 |
juniper | junos | 15.1:f2-s4 |
juniper | junos | 15.1:f3 |
juniper | junos | 15.1:f4 |
juniper | junos | 15.1:f5 |
juniper | junos | 15.1:f5-s7 |
juniper | junos | 15.1:f6 |
juniper | junos | 15.1:f6-s1 |
juniper | junos | 15.1:f6-s10 |
juniper | junos | 15.1:f6-s12 |
juniper | junos | 15.1:f6-s2 |
juniper | junos | 15.1:f6-s3 |
juniper | junos | 15.1:f6-s4 |
juniper | junos | 15.1:f6-s5 |
juniper | junos | 15.1:f6-s6 |
juniper | junos | 15.1:f6-s7 |
juniper | junos | 15.1:f6-s8 |
juniper | junos | 15.1:f6-s9 |
juniper | junos | 15.1:f7 |
juniper | junos | 15.1:r |
juniper | junos | 15.1:r1 |
juniper | junos | 15.1:r2 |
juniper | junos | 15.1:r3 |
juniper | junos | 15.1:r4 |
juniper | junos | 15.1:r4-s7 |
juniper | junos | 15.1:r4-s8 |
juniper | junos | 15.1:r4-s9 |
juniper | junos | 15.1:r5 |
juniper | junos | 15.1:r5-s1 |
juniper | junos | 15.1:r5-s3 |
juniper | junos | 15.1:r5-s5 |
juniper | junos | 15.1:r5-s6 |
juniper | junos | 15.1:r6 |
juniper | junos | 15.1:r6-s1 |
juniper | junos | 15.1:r6-s2 |
juniper | junos | 15.1:r6-s3 |
juniper | junos | 15.1:r6-s4 |
juniper | junos | 15.1:r6-s6 |
juniper | junos | 15.1:r7 |
juniper | junos | 15.1:r7-s1 |
juniper | junos | 15.1:r7-s2 |
juniper | junos | 15.1:r7-s3 |
juniper | junos | 15.1:r7-s4 |
juniper | junos | 15.1:r7-s5 |
juniper | junos | 15.1:r7-s6 |
juniper | junos | 15.1:r7-s7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration