CVE-2018-0049

CVSS V2 High 7.1 CVSS V3 High 7.5
Description
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
Overview
  • CVE ID
  • CVE-2018-0049
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-10-10T18:29:02
  • Last Modified Date
  • 2022-05-12T18:07:44
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.2x75:d100:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.1
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://kb.juniper.net/KB30092 Vendor Advisory
https://kb.juniper.net/JSA10883 Vendor Advisory
http://www.securitytracker.com/id/1041850 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105701 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 17:08:05 Added to TrackCVE
2022-12-03 13:10:05 2018-10-10T18:29Z 2018-10-10T18:29:02 CVE Published Date updated
2022-12-03 13:10:05 2022-05-12T18:07:44 CVE Modified Date updated
2022-12-03 13:10:05 Analyzed Vulnerability Status updated