A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affected Juniper Networks Junos OS releases are: 14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D50 on EX and QFX series; 14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8; No other Junos OS releases are affected by this issue. No other Juniper Networks products are affected by this issue.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1040039 | |
https://kb.juniper.net/JSA10818 | Vendor Advisory |
http://www.securitytracker.com/id/1040039 | |
https://kb.juniper.net/JSA10818 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1040039 - | |
References | () https://kb.juniper.net/JSA10818 - Vendor Advisory |
Information
Published : 2017-10-13 17:29
Updated : 2024-11-21 03:06
NVD link : CVE-2017-10615
Mitre link : CVE-2017-10615
CVE.ORG link : CVE-2017-10615
JSON object : View
Products Affected
juniper
- ex3300
- ex3200
- ex4500-vc
- ex4300
- ex4550
- ex8200
- ex3300-vc
- ex6200
- ex4200-vc
- ex4300-vc
- ex4600
- junos
- ex8200-vc
- ex4200
- ex4550-vc
- ex4600-vc
- ex4500
CWE
CWE-20
Improper Input Validation