A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D60 on SRX Series; 15.1 versions prior to 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D120 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D470, 15.1X53-D495 on NFX Series; 16.1 versions prior to 16.1R6; 16.2 versions prior to 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R2-S6, 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R2. No other Juniper Networks products or platforms are affected by this issue.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Junos | Juniper | 12.1x46 (including) | 12.1x46 (including) |
Junos | Juniper | 12.1x46-d10 (including) | 12.1x46-d10 (including) |
Junos | Juniper | 12.1x46-d15 (including) | 12.1x46-d15 (including) |
Junos | Juniper | 12.1x46-d20 (including) | 12.1x46-d20 (including) |
Junos | Juniper | 12.1x46-d25 (including) | 12.1x46-d25 (including) |
Junos | Juniper | 12.1x46-d30 (including) | 12.1x46-d30 (including) |
Junos | Juniper | 12.1x46-d35 (including) | 12.1x46-d35 (including) |
Junos | Juniper | 12.1x46-d40 (including) | 12.1x46-d40 (including) |
Junos | Juniper | 12.1x46-d45 (including) | 12.1x46-d45 (including) |
Junos | Juniper | 12.1x46-d50 (including) | 12.1x46-d50 (including) |
Junos | Juniper | 12.1x46-d55 (including) | 12.1x46-d55 (including) |
Junos | Juniper | 12.1x46-d60 (including) | 12.1x46-d60 (including) |
Junos | Juniper | 12.1x46-d65 (including) | 12.1x46-d65 (including) |
Input validation is a frequently-used technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components. Input can consist of:
Data can be simple or structured. Structured data can be composed of many nested layers, composed of combinations of metadata and raw data, with other simple or structured data. Many properties of raw data or metadata may need to be validated upon entry into the code, such as:
Implied or derived properties of data must often be calculated or inferred by the code itself. Errors in deriving properties may be considered a contributing factor to improper input validation.