Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Junos OS: EX, QFX and MX series: Packet Forwarding Engine manager (FXPC) process crashes due to a crafted HTTP packet in a Virtual Chassis configuration
Vulnerability Description
A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. This issue only occurs when the crafted packet it destined to the device. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D47 on EX and QFX Virtual Chassis Platforms; 15.1 versions prior to 15.1R7-S3 all Virtual Chassis Platforms 15.1X53 versions prior to 15.1X53-D50 on EX and QFX Virtual Chassis Platforms.
CVSS Information
N/A
Vulnerability Type
对未经初始化资源的使用
Vulnerability Title
多款Juniper产品Junos OS 输入验证错误漏洞
Vulnerability Description
Juniper EX Virtual Chassis Platforms、MX Virtual Chassis Platforms和QFX Virtual Chassis Platforms都是美国瞻博网络(Juniper Networks)公司的使用在交换机中的不同系列的虚拟机箱模块。Junos OS是运行在其中的一套操作系统。 多款Juniper产品上的Junos OS 14.1X53版本、15.1版本和15.1X53中存在安全漏洞。攻击者可借助特制的HTTP数据包利用该漏洞造成fxpc守护进程崩溃或
CVSS Information
N/A
Vulnerability Type
N/A