Vulnerability Details : CVE-2014-3818
Juniper Junos OS 9.1 through 11.4 before 11.4R11, 12.1 before R10, 12.1X44 before D40, 12.1X46 before D30, 12.1X47 before D11 and 12.147-D15, 12.1X48 before D41 and D62, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S2, 13.1X49 before D49, 13.1X50 before 30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D25, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when supporting 4-byte AS numbers and a BGP peer does not, allows remote attackers to cause a denial of service (memory corruption and RDP routing process crash and restart) via crafted transitive attributes in a BGP UPDATE.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3818
Probability of exploitation activity in the next 30 days: 0.24%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 61 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3818
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-3818
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3818
-
http://www.securitytracker.com/id/1031009
Juniper Junos BGP UPDATE Processing Flaw Lets Remote Users Deny Service - SecurityTracker
-
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10653
Juniper Networks - 2014-10 Security Bulletin: Junos: BGP UPDATE with crafted transitive attributes causes memory corruption and leads to RPD core (CVE-2014-3818)Vendor Advisory
Products affected by CVE-2014-3818
- cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:11.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:9.6:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:9.4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:9.5:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.2x50:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.2x52:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x48:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.2x50:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.1x49:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.1x50:*:*:*:*:*:*:*