Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95403 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037593 | Third Party Advisory VDB Entry |
https://kb.juniper.net/JSA10773 | Vendor Advisory |
http://www.securityfocus.com/bid/95403 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037593 | Third Party Advisory VDB Entry |
https://kb.juniper.net/JSA10773 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/95403 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037593 - Third Party Advisory, VDB Entry | |
References | () https://kb.juniper.net/JSA10773 - Vendor Advisory |
Information
Published : 2017-05-30 14:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2304
Mitre link : CVE-2017-2304
CVE.ORG link : CVE-2017-2304
JSON object : View
Products Affected
juniper
- qfx3500
- qfx5200
- ex4600
- junos
- ex4300
- qfx5100
- qfx3600
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor