Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-0006 | First vendor Publication | 2018-01-10 |
Vendor | Cve | Last vendor Modification | 2019-10-09 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 5.3 | ||
Base Score | 5.3 | Environmental Score | 5.3 |
impact SubScore | 3.6 | Temporal Score | 5.3 |
Exploitabality Sub Score | 1.6 | ||
Attack Vector | Adjacent | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:M/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 2.9 | Attack Range | Adjacent network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 5.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by attempting to process an unbounded number of pending VLAN authentication requests, leading to excessive memory allocation. This issue only affects devices configured for DHCPv4/v6 over AE auto-sensed VLANs, utilized in Broadband Edge (BBE) deployments. Other configurations are unaffected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R6-S2, 15.1R7; 16.1 versions prior to 16.1R5-S1, 16.1R6; 16.2 versions prior to 16.2R2-S2, 16.2R3; 17.1 versions prior to 17.1R2-S5, 17.1R3; 17.2 versions prior to 17.2R2. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0006 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-770 | Allocation of Resources Without Limits or Throttling |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-01-26 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10834.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
CONFIRM | https://kb.juniper.net/JSA10834 |
SECTRACK | http://www.securitytracker.com/id/1040184 |
Alert History
Date | Informations |
---|---|
2024-02-02 01:50:03 |
|
2024-02-01 12:14:08 |
|
2023-09-05 12:48:00 |
|
2023-09-05 01:13:51 |
|
2023-09-02 12:47:32 |
|
2023-09-02 01:14:08 |
|
2023-08-12 12:51:14 |
|
2023-08-12 01:13:25 |
|
2023-08-11 12:45:34 |
|
2023-08-11 01:13:46 |
|
2023-08-06 12:44:08 |
|
2023-08-06 01:13:22 |
|
2023-08-04 12:44:22 |
|
2023-08-04 01:13:27 |
|
2023-07-14 12:44:24 |
|
2023-07-14 01:13:29 |
|
2023-03-29 01:46:03 |
|
2023-03-28 12:13:49 |
|
2022-10-11 12:39:49 |
|
2022-10-11 01:13:31 |
|
2021-05-04 13:07:20 |
|
2021-04-22 02:21:05 |
|
2020-05-23 01:04:55 |
|
2019-10-10 05:20:09 |
|
2019-10-03 09:20:40 |
|
2019-04-16 12:09:05 |
|
2018-02-15 17:20:00 |
|
2018-01-20 09:22:16 |
|
2018-01-11 05:20:40 |
|