First published: Wed Jan 10 2018(Updated: )
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.1x46-d10 | |
Juniper JUNOS | =12.1x46-d15 | |
Juniper JUNOS | =12.1x46-d20 | |
Juniper JUNOS | =12.1x46-d25 | |
Juniper JUNOS | =12.1x46-d30 | |
Juniper JUNOS | =12.1x46-d35 | |
Juniper JUNOS | =12.1x46-d40 | |
Juniper JUNOS | =12.1x46-d45 | |
Juniper JUNOS | =12.1x46-d50 | |
Juniper JUNOS | =12.1x46-d55 | |
Juniper JUNOS | =12.1x46-d60 | |
Juniper JUNOS | =12.1x46-d65 | |
Juniper JUNOS | =12.3x48-d10 | |
Juniper JUNOS | =12.3x48-d15 | |
Juniper JUNOS | =12.3x48-d20 | |
Juniper JUNOS | =12.3x48-d25 | |
Juniper JUNOS | =12.3x48-d30 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper JUNOS | =15.1x49-d30 | |
Juniper JUNOS | =15.1x53-d20 | |
Juniper JUNOS | =15.1x53-d21 | |
Juniper JUNOS | =15.1x53-d25 | |
Juniper JUNOS | =15.1x53-d30 | |
Juniper JUNOS | =15.1x53-d32 | |
Juniper JUNOS | =15.1x53-d33 | |
Juniper JUNOS | =15.1x53-d34 | |
Juniper JUNOS | =15.1x53-d60 | |
Juniper JUNOS | =15.1x53-d61 | |
Juniper JUNOS | =15.1x53-d62 | |
Juniper JUNOS | =15.1x53-d63 | |
Juniper JUNOS | =14.1 | |
Juniper JUNOS | =14.1-r1 | |
Juniper JUNOS | =14.1-r2 | |
Juniper JUNOS | =14.1-r3 | |
Juniper JUNOS | =14.1-r4 | |
Juniper JUNOS | =14.1-r8 | |
Juniper JUNOS | =14.1-r9 | |
Juniper JUNOS | =14.2-r1 | |
Juniper JUNOS | =14.2-r2 | |
Juniper JUNOS | =14.2-r3 | |
Juniper JUNOS | =14.2-r4 | |
Juniper JUNOS | =14.2-r5 | |
Juniper JUNOS | =14.2-r7 | |
Juniper JUNOS | =14.2-r8 | |
Juniper JUNOS | =15.1-r1 | |
Juniper JUNOS | =15.1-r2 | |
Juniper JUNOS | =12.3 | |
Juniper JUNOS | =12.3-r1 | |
Juniper JUNOS | =12.3-r10 | |
Juniper JUNOS | =12.3-r2 | |
Juniper JUNOS | =12.3-r3 | |
Juniper JUNOS | =12.3-r4 | |
Juniper JUNOS | =12.3-r5 | |
Juniper JUNOS | =12.3-r6 | |
Juniper JUNOS | =12.3-r7 | |
Juniper JUNOS | =12.3-r8 | |
Juniper JUNOS | =12.3-r9 | |
Juniper JUNOS | =14.1x53 | |
Juniper JUNOS | =14.1x53-d10 | |
Juniper JUNOS | =14.1x53-d15 | |
Juniper JUNOS | =14.1x53-d16 | |
Juniper JUNOS | =14.1x53-d25 | |
Juniper JUNOS | =14.1x53-d26 | |
Juniper JUNOS | =14.1x53-d27 | |
Juniper JUNOS | =14.1x53-d35 | |
Juniper JUNOS | =14.1x53-d50 |
The following software releases have been updated to resolve this specific issue: 12.1X46-D67, 12.3R12-S8*, 12.3X48-D55, 14.1R8-S5, 14.1R9, 14.1X53-D44, 14.1X53-D50, 14.2R7-S7, 14.2R8, 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R7, 15.1X49-D100, 15.1X53-D70, 16.1R4-S6, 16.1R5, 16.2R2-S2, 16.2R3, 17.1R2-S5*, 17.1R3*, 17.2R2, 17.3R1, and all subsequent releases. *Pending release NOTE: While Junos OS 12.3R12-S5, 12.3X48-D35, 15.1F2+, 15.1R3, 15.1X49-D30, and all subsequent releases are not vulnerable, this issue has been proactively resolved.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.