CVE-2023-44177
13.10.2023, 00:15
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions prior to 19.1R3-S10; * 19.2 versions prior to 19.2R3-S7; * 19.3 versions prior to 19.3R3-S8; * 19.4 versions prior to 19.4R3-S12; * 20.2 versions prior to 20.2R3-S8; * 20.4 versions prior to 20.4R3-S8; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R3; * 22.4 versions prior to 22.4R2. Junos OS Evolved: * All versions prior to 20.4R3-S8-EVO; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S3-EVO; * 22.2 versions prior to 22.2R3-S1-EVO; * 22.3 versions prior to 22.3R3-EVO; * 22.4 versions prior to 22.4R2-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 20.4 |
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 20.4:r3-s1 |
juniper | junos | 20.4:r3-s2 |
juniper | junos | 20.4:r3-s3 |
juniper | junos | 20.4:r3-s4 |
juniper | junos | 20.4:r3-s5 |
juniper | junos | 20.4:r3-s6 |
juniper | junos | 20.4:r3-s7 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.2:r3 |
juniper | junos | 21.2:r3-s1 |
juniper | junos | 21.2:r3-s2 |
juniper | junos | 21.2:r3-s3 |
juniper | junos | 21.2:r3-s4 |
juniper | junos | 21.2:r3-s5 |
juniper | junos | 21.3 |
juniper | junos | 21.3:r1 |
juniper | junos | 21.3:r1-s1 |
juniper | junos | 21.3:r1-s2 |
juniper | junos | 21.3:r2 |
juniper | junos | 21.3:r2-s1 |
juniper | junos | 21.3:r2-s2 |
juniper | junos | 21.3:r3 |
juniper | junos | 21.3:r3-s1 |
juniper | junos | 21.3:r3-s2 |
juniper | junos | 21.3:r3-s3 |
juniper | junos | 21.3:r3-s4 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 21.4:r2-s2 |
juniper | junos | 21.4:r3 |
juniper | junos | 21.4:r3-s1 |
juniper | junos | 21.4:r3-s2 |
juniper | junos | 21.4:r3-s3 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
juniper | junos | 22.1:r1-s2 |
juniper | junos | 22.1:r2 |
juniper | junos | 22.1:r2-s1 |
juniper | junos | 22.1:r2-s2 |
juniper | junos | 22.1:r3 |
juniper | junos | 22.1:r3-s1 |
juniper | junos | 22.1:r3-s2 |
juniper | junos | 22.2:r1 |
juniper | junos | 22.2:r1-s1 |
juniper | junos | 22.2:r1-s2 |
juniper | junos | 22.2:r2 |
juniper | junos | 22.2:r2-s1 |
juniper | junos | 22.2:r2-s2 |
juniper | junos | 22.2:r3 |
juniper | junos | 22.3:r1 |
juniper | junos | 22.3:r1-s1 |
juniper | junos | 22.3:r1-s2 |
juniper | junos | 22.3:r2 |
juniper | junos | 22.3:r2-s1 |
juniper | junos | 22.3:r2-s2 |
juniper | junos | 22.4:r1 |
juniper | junos | 22.4:r1-s1 |
juniper | junos | 22.4:r1-s2 |
juniper | junos_os_evolved | 𝑥 < 20.4 |
juniper | junos_os_evolved | 20.4 |
juniper | junos_os_evolved | 20.4:r1 |
juniper | junos_os_evolved | 20.4:r1-s1 |
juniper | junos_os_evolved | 20.4:r1-s2 |
juniper | junos_os_evolved | 20.4:r2 |
juniper | junos_os_evolved | 20.4:r2-s1 |
juniper | junos_os_evolved | 20.4:r2-s2 |
juniper | junos_os_evolved | 20.4:r2-s3 |
juniper | junos_os_evolved | 20.4:r3 |
juniper | junos_os_evolved | 20.4:r3-s1 |
juniper | junos_os_evolved | 20.4:r3-s2 |
juniper | junos_os_evolved | 20.4:r3-s3 |
juniper | junos_os_evolved | 20.4:r3-s4 |
juniper | junos_os_evolved | 20.4:r3-s5 |
juniper | junos_os_evolved | 20.4:r3-s6 |
juniper | junos_os_evolved | 20.4:r3-s7 |
juniper | junos_os_evolved | 21.2 |
juniper | junos_os_evolved | 21.2:r1 |
juniper | junos_os_evolved | 21.2:r1-s1 |
juniper | junos_os_evolved | 21.2:r1-s2 |
juniper | junos_os_evolved | 21.2:r2 |
juniper | junos_os_evolved | 21.2:r2-s1 |
juniper | junos_os_evolved | 21.2:r2-s2 |
juniper | junos_os_evolved | 21.2:r3 |
juniper | junos_os_evolved | 21.2:r3-s1 |
juniper | junos_os_evolved | 21.2:r3-s2 |
juniper | junos_os_evolved | 21.2:r3-s3 |
juniper | junos_os_evolved | 21.2:r3-s4 |
juniper | junos_os_evolved | 21.2:r3-s5 |
juniper | junos_os_evolved | 21.3 |
juniper | junos_os_evolved | 21.3:r1 |
juniper | junos_os_evolved | 21.3:r1-s1 |
juniper | junos_os_evolved | 21.3:r2 |
juniper | junos_os_evolved | 21.3:r2-s1 |
juniper | junos_os_evolved | 21.3:r2-s2 |
juniper | junos_os_evolved | 21.3:r3 |
juniper | junos_os_evolved | 21.3:r3-s1 |
juniper | junos_os_evolved | 21.3:r3-s2 |
juniper | junos_os_evolved | 21.3:r3-s3 |
juniper | junos_os_evolved | 21.3:r3-s4 |
juniper | junos_os_evolved | 21.4 |
juniper | junos_os_evolved | 21.4:r1 |
juniper | junos_os_evolved | 21.4:r1-s1 |
juniper | junos_os_evolved | 21.4:r1-s2 |
juniper | junos_os_evolved | 21.4:r2 |
juniper | junos_os_evolved | 21.4:r2-s1 |
juniper | junos_os_evolved | 21.4:r2-s2 |
juniper | junos_os_evolved | 21.4:r3 |
juniper | junos_os_evolved | 21.4:r3-s1 |
juniper | junos_os_evolved | 21.4:r3-s2 |
juniper | junos_os_evolved | 21.4:r3-s3 |
juniper | junos_os_evolved | 22.1:r1 |
juniper | junos_os_evolved | 22.1:r1-s1 |
juniper | junos_os_evolved | 22.1:r1-s2 |
juniper | junos_os_evolved | 22.1:r2 |
juniper | junos_os_evolved | 22.1:r2-s1 |
juniper | junos_os_evolved | 22.1:r3 |
juniper | junos_os_evolved | 22.1:r3-s1 |
juniper | junos_os_evolved | 22.1:r3-s2 |
juniper | junos_os_evolved | 22.2:r1 |
juniper | junos_os_evolved | 22.2:r1-s1 |
juniper | junos_os_evolved | 22.2:r2 |
juniper | junos_os_evolved | 22.2:r2-s1 |
juniper | junos_os_evolved | 22.2:r2-s2 |
juniper | junos_os_evolved | 22.2:r3 |
juniper | junos_os_evolved | 22.3:r1 |
juniper | junos_os_evolved | 22.3:r1-s1 |
juniper | junos_os_evolved | 22.3:r1-s2 |
juniper | junos_os_evolved | 22.3:r2 |
juniper | junos_os_evolved | 22.3:r2-s1 |
juniper | junos_os_evolved | 22.3:r2-s2 |
juniper | junos_os_evolved | 22.4:r1 |
juniper | junos_os_evolved | 22.4:r1-s1 |
juniper | junos_os_evolved | 22.4:r1-s2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.