juniper junos 使用共享资源的并发执行不恰当同步问题(竞争条件)
CVE编号
CVE-2021-0247利用情况
暂无补丁情况
N/A披露时间
2021-04-23漏洞描述
A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter on any interfaces of a device. This issue is detectable by reviewing the PFE firewall rules, as well as the firewall counters and seeing if they are incrementing or not. For example: show firewall Filter: __default_bpdu_filter__ Filter: FILTER-INET-01 Counters: Name Bytes Packets output-match-inet 0 0 <<<<<< missing firewall packet count This issue affects: Juniper Networks Junos OS 14.1X53 versions prior to 14.1X53-D53 on QFX Series; 14.1 versions 14.1R1 and later versions prior to 15.1 versions prior to 15.1R7-S6 on QFX Series, PTX Series; 15.1X53 versions prior to 15.1X53-D593 on QFX Series; 16.1 versions prior to 16.1R7-S7 on QFX Series, PTX Series; 16.2 versions prior to 16.2R2-S11, 16.2R3 on QFX Series, PTX Series; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on QFX Series, PTX Series; 17.2 versions prior to 17.2R1-S9, 17.2R3-S3 on QFX Series, PTX Series; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on QFX Series, PTX Series; 17.4 versions prior to 17.4R2-S9, 17.4R3 on QFX Series, PTX Series; 18.1 versions prior to 18.1R3-S9 on QFX Series, PTX Series; 18.2 versions prior to 18.2R2-S6, 18.2R3-S3 on QFX Series, PTX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1 on QFX Series, PTX Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R2-S7, 18.4R3 on QFX Series, PTX Series; 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3 on QFX Series, PTX Series; 19.2 versions prior to 19.2R1-S3, 19.2R2 on QFX Series, PTX Series.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://kb.juniper.net/JSA11140 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | juniper | junos | 14.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 14.1x53 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 14.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 15.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 15.1x53 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 16.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 16.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 17.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 17.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 17.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 17.4 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.4 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.2 | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10001-36mr | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10002 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10003 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10004 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10008 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10016 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx3000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx5000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10002 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10008 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10016 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5110 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5120 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5130 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5210 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx5220 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 高
- 影响范围 已更改
- 用户交互 需要
- 可用性 低
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-362 | 使用共享资源的并发执行不恰当同步问题(竞争条件) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论