CVE-2020-1647Double Free in Networks Junos OS

CWE-415Double Free5 documents5 sources
Severity
9.8CRITICALNVD
EPSS
2.0%
top 16.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 17
Latest updateMar 20

Description

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP message may result in an extended Denial of Service (DoS). The offending HTTP message that causes this issue may originate both from the HTTP server or the client. This issue affects Juniper Networks Junos OS

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.118.1R3-S9+6
NVDjuniper/junos7 versions+6

🔴Vulnerability Details

2
GHSA
GHSA-9w82-5jc2-rr7m: On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a De2022-05-24
CVEList
Junos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution due to the processing of a specific HTTP message when ICAP redirect service is enabled2020-07-17

📋Vendor Advisories

1
Juniper
CVE-2020-1647: On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a De2020-07-17

📄Research Papers

1
arXiv
Fat Pointers for Temporal Memory Safety of C2023-03-20
CVE-2020-1647 — Double Free in Networks Junos OS | cvebase