First published: Fri Jul 17 2020(Updated: )
On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP message may result in an extended Denial of Service (DoS). The offending HTTP message that causes this issue may originate both from the HTTP server or the client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S1; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =18.1 | |
Junos OS Evolved | =18.1-r1 | |
Junos OS Evolved | =18.1-r2 | |
Junos OS Evolved | =18.1-r2-s1 | |
Junos OS Evolved | =18.1-r2-s2 | |
Junos OS Evolved | =18.1-r2-s4 | |
Junos OS Evolved | =18.1-r3 | |
Junos OS Evolved | =18.1-r3-s1 | |
Junos OS Evolved | =18.1-r3-s2 | |
Junos OS Evolved | =18.1-r3-s3 | |
Junos OS Evolved | =18.1-r3-s4 | |
Junos OS Evolved | =18.1-r3-s6 | |
Junos OS Evolved | =18.1-r3-s7 | |
Junos OS Evolved | =18.1-r3-s8 | |
Junos OS Evolved | =18.2 | |
Junos OS Evolved | =18.2-r1 | |
Junos OS Evolved | =18.2-r1 | |
Junos OS Evolved | =18.2-r1-s3 | |
Junos OS Evolved | =18.2-r1-s4 | |
Junos OS Evolved | =18.2-r1-s5 | |
Junos OS Evolved | =18.2-r2 | |
Junos OS Evolved | =18.2-r2-s1 | |
Junos OS Evolved | =18.2-r2-s2 | |
Junos OS Evolved | =18.2-r2-s3 | |
Junos OS Evolved | =18.2-r2-s4 | |
Junos OS Evolved | =18.2-r2-s5 | |
Junos OS Evolved | =18.2-r2-s6 | |
Junos OS Evolved | =18.2-r3 | |
Junos OS Evolved | =18.2-r3-s1 | |
Junos OS Evolved | =18.2-r3-s2 | |
Junos OS Evolved | =18.3 | |
Junos OS Evolved | =18.3-r1 | |
Junos OS Evolved | =18.3-r1-s1 | |
Junos OS Evolved | =18.3-r1-s2 | |
Junos OS Evolved | =18.3-r1-s3 | |
Junos OS Evolved | =18.3-r1-s5 | |
Junos OS Evolved | =18.3-r1-s6 | |
Junos OS Evolved | =18.3-r2 | |
Junos OS Evolved | =18.3-r2-s1 | |
Junos OS Evolved | =18.3-r2-s2 | |
Junos OS Evolved | =18.3-r2-s3 | |
Junos OS Evolved | =18.3-r3 | |
Junos OS Evolved | =18.4 | |
Junos OS Evolved | =18.4-r1 | |
Junos OS Evolved | =18.4-r1-s1 | |
Junos OS Evolved | =18.4-r1-s2 | |
Junos OS Evolved | =18.4-r1-s5 | |
Junos OS Evolved | =18.4-r1-s6 | |
Junos OS Evolved | =18.4-r2 | |
Junos OS Evolved | =18.4-r2-s1 | |
Junos OS Evolved | =18.4-r2-s2 | |
Junos OS Evolved | =18.4-r2-s3 | |
Junos OS Evolved | =18.4-r2-s4 | |
Junos OS Evolved | =19.1 | |
Junos OS Evolved | =19.1-r1 | |
Junos OS Evolved | =19.1-r1-s1 | |
Junos OS Evolved | =19.1-r1-s2 | |
Junos OS Evolved | =19.1-r1-s3 | |
Junos OS Evolved | =19.1-r1-s4 | |
Junos OS Evolved | =19.2 | |
Junos OS Evolved | =19.2-r1 | |
Junos OS Evolved | =19.2-r1-s1 | |
Junos OS Evolved | =19.3 | |
Junos OS Evolved | =19.3-r1 | |
Junos OS Evolved | =19.3-r1-s1 |
The following software releases have been updated to resolve this specific issue: 18.1R3-S9, 18.2R3-S3, 18.3R2-S4, 18.3R3-S1, 18.4R2-S5, 18.4R3, 19.1R2, 19.2R1-S2, 19.2R2, 19.3R2, 19.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1647 is classified as high severity due to its potential to cause Denial of Service (DoS) or Remote Code Execution (RCE).
To fix CVE-2020-1647, update the affected Juniper Networks SRX Series with the recommended patches from Juniper's security advisory.
CVE-2020-1647 affects several versions of Junos OS, including 18.1, 18.2, 18.3, and 18.4.
CVE-2020-1647 is a double free vulnerability related to the processing of specific HTTP messages in the ICAP redirect service.
Yes, CVE-2020-1647 can potentially lead to data breaches if exploited, as it allows for remote code execution.