Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #3242 (01/09/2020)

9 new signatures:

HIGHHTTP:CTS:TRIVIUM-WEBTOUCH-AU-BYHTTP: Touchpad Trivum Authentication Bypass
MEDIUMHTTP:MISC:NTOP-NG-AUTH-BYHTTP: Ntop-NG CVE-2018-12520 Authentication Bypass
MEDIUMHTTP:PROXY:SQUID-DIGEST-NONC-IDHTTP: Squid Proxy Digest Nonce Information Disclosure
HIGHHTTP:STC:CVE-2020-0610-RCEHTTP: Microsoft Windows RDP Gateway Server Remote Code Execution
HIGHHTTP:MISC:ANT-MAN-AUTH-BYHTTP: antMan 0.9.1a CVE-2018-7739 Authentication Bypass
MEDIUMHTTP:SQL:INJ:RCONF-DEVICES-PHPHTTP: rConfig devices.inc.php SQL Injection
MEDIUMHTTP:XSS:OPENEMR-XSSHTTP: OpenEMR facility_admin.php Cross-Site Scripting
HIGHHTTP:CTS:CONTEC-AUTH-BYPASSHTTP: Contec Smart Home Authentication Bypass
MEDIUMHTTP:PIRELLI-ADSL2-IDHTTP: Pirelli ADSL2/2+ Wireless Router Information Disclosure

4 updated signatures:

CRITICALHTTP:STC:QNAP-MULTIPLE-RCE-CVEHTTP: QNAP Qcenter Virtual Appliance Multiple CVE's Remote Code Execution
HIGHHTTP:STC:IE:IE-MEM-CORRHTTP: Microsoft Internet Explorer Memory Corruption (MS12-010)
HIGHHTTP:STC:DL:CVE-2016-0101-RCEHTTP: Microsoft Windows Media Player CVE-2016-0101 Remote Code Execution
MEDIUMSMB:INFO:CVE-2019-1040-TAMPERSMB: Microsoft Windows NTLM Message Integrity Check Tampering


Details of the signatures included within this bulletin:


HTTP:STC:QNAP-MULTIPLE-RCE-CVE - HTTP: QNAP Qcenter Virtual Appliance Multiple CVE's Remote Code Execution

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known vulnerability against QNAP Qcenter Virtual Appliance. A successful attack can lead to arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-0710
  • cve: CVE-2018-0709
  • cve: CVE-2018-0708
  • cve: CVE-2018-0707
  • url: https://www.qnap.com/en-us/security-advisory/nas-201807-10

Affected Products:

  • Qnap q'center 1.7.1063

HTTP:STC:DL:CVE-2016-0101-RCE - HTTP: Microsoft Windows Media Player CVE-2016-0101 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Windows Media Player. A successful attack can lead to remote code execution

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2016-0101

Affected Products:

  • Microsoft windows_server_2012 r2
  • Microsoft windows_10 -
  • Microsoft windows_7 -
  • Microsoft windows_server_2012 -
  • Microsoft windows_server_2008 r2
  • Microsoft windows_8.1 -
  • Microsoft windows_10 1511
  • Microsoft windows_rt_8.1 -

SMB:INFO:CVE-2019-1040-TAMPER - SMB: Microsoft Windows NTLM Message Integrity Check Tampering

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against NTLM component of Microsoft Windows. Successful exploitation results in the modification of flags on the NTLM packet without invalidating the Message Integrity Check signature.

Supported On:

idp-5.1.110161014, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2019-1166
  • cve: CVE-2019-1040

Affected Products:

  • Microsoft windows_10 1607
  • Microsoft windows_server_2016 1903
  • Microsoft windows_rt_8.1 -
  • Microsoft windows_10 1803
  • Microsoft windows_10 1809
  • Microsoft windows_server_2019 -
  • Microsoft windows_server_2016 1803
  • Microsoft windows_10 1903
  • Microsoft windows_8.1 -
  • Microsoft windows_server_2008 r2
  • Microsoft windows_server_2012 -
  • Microsoft windows_10 1709
  • Microsoft windows_7 -
  • Microsoft windows_10 -
  • Microsoft windows_10 1703
  • Microsoft windows_server_2016 -
  • Microsoft windows_server_2008 -
  • Microsoft windows_server_2012 r2

HTTP:STC:IE:IE-MEM-CORR - HTTP: Microsoft Internet Explorer Memory Corruption (MS12-010)

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2012-0011
  • cve: CVE-2012-0155
  • bugtraq: 51935
  • bugtraq: 51933

Affected Products:

  • Avaya meeting_exchange 5.2
  • Microsoft internet_explorer 7.0
  • Avaya callpilot 4.0
  • Microsoft internet_explorer 9
  • Avaya communication_server_1000_telephony_manager 3.0
  • Avaya communication_server_1000_telephony_manager 4.0
  • Avaya messaging_application_server 5.2
  • Avaya meeting_exchange 5.0 SP1
  • Avaya meeting_exchange 5.0 SP2
  • Avaya meeting_exchange 5.1 SP1
  • Avaya meeting_exchange 5.0
  • Avaya meeting_exchange-client_registration_server
  • Avaya meeting_exchange-recording_server
  • Avaya meeting_exchange-streaming_server
  • Avaya meeting_exchange-web_conferencing_server
  • Avaya meeting_exchange-webportal
  • Avaya messaging_application_server 4
  • Avaya messaging_application_server 5
  • Avaya meeting_exchange 5.0.0.0.52
  • Avaya aura_conferencing 6.0 Standard
  • Microsoft internet_explorer 8
  • Avaya callpilot 5.0
  • Avaya meeting_exchange 5.1
  • Avaya meeting_exchange 5.2 SP2
  • Avaya meeting_exchange 5.2 SP1

HTTP:CTS:TRIVIUM-WEBTOUCH-AU-BY - HTTP: Touchpad Trivum Authentication Bypass

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Touchpad Trivum WebTouch. A successful attack can lead to security bypass.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-13859
  • cve: CVE-2018-13862

Affected Products:

  • Trivum c4_professional_firmware 8.76

HTTP:MISC:NTOP-NG-AUTH-BY - HTTP: Ntop-NG CVE-2018-12520 Authentication Bypass

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Ntop-NG. A successful attack can lead to arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-12520

Affected Products:

  • Ntop ntopng 3.4

HTTP:PIRELLI-ADSL2-ID - HTTP: Pirelli ADSL2/2+ Wireless Router Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Pirelli ADSL2/2+ Wireless Router. A successful attack can lead to information Disclosure.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 72705
  • cve: CVE-2015-0554

Affected Products:

  • Adb p.dga4001n_firmware pdg_tef_sp_4.06l.6

HTTP:XSS:OPENEMR-XSS - HTTP: OpenEMR facility_admin.php Cross-Site Scripting

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known cross-site scripting vulnerability against OpenEMR. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2019-8368

Affected Products:

  • Open-emr openemr 5.0.1-6

HTTP:STC:CVE-2020-0610-RCE - HTTP: Microsoft Windows RDP Gateway Server Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against RDP Gateway Server. A successful attack can lead to arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2020-0610

Affected Products:

  • Microsoft windows_server_2016 -
  • Microsoft windows_server_2012 -
  • Microsoft windows_server_2019 -
  • Microsoft windows_server_2012 r2

HTTP:MISC:ANT-MAN-AUTH-BY - HTTP: antMan 0.9.1a CVE-2018-7739 Authentication Bypass

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against antMan 0.9.1a. A successful attack can lead to authentication bypass.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-7739

Affected Products:

  • Antsle antman 0.9.0c

HTTP:SQL:INJ:RCONF-DEVICES-PHP - HTTP: rConfig devices.inc.php SQL Injection

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against rConfig Network Device Configuration Tool. A successful attack can lead to command injection and arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2019-19207

Affected Products:

  • Rconfig rconfig 3.9.2

HTTP:CTS:CONTEC-AUTH-BYPASS - HTTP: Contec Smart Home Authentication Bypass

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Contec Smart Home. A successful attack can lead to security bypass.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-9162

Affected Products:

  • Contec-touch smart_home_firmware 4.15

HTTP:PROXY:SQUID-DIGEST-NONC-ID - HTTP: Squid Proxy Digest Nonce Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Squid Proxy. A successful attack can lead to sensitive information disclosure.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2019-18679

Affected Products:

  • Squid-cache squid 3.2.0.8
  • Squid-cache squid 3.2.0.17
  • Squid-cache squid 3.3.11
  • Squid-cache squid 3.2.0.16
  • Squid-cache squid 3.0.stable16
  • Squid-cache squid 3.5.0.4
  • Fedoraproject fedora 30
  • Squid-cache squid 3.3.0
  • Squid-cache squid 2.5.stable10
  • Squid-cache squid 3.5.28
  • Squid-cache squid 3.4.12
  • Squid-cache squid 4.0.21
  • Squid-cache squid 3.2.0.14
  • Squid-cache squid 3.0.stable14
  • Squid-cache squid 3.5.0.2
  • Squid-cache squid 3.3.2
  • Squid-cache squid 3.1.12
  • Squid-cache squid 2.5.stable14
  • Squid-cache squid 3.4.2
  • Squid-cache squid 4.0.8
  • Squid-cache squid 3.3.4
  • Squid-cache squid 3.1.10
  • Debian debian_linux 8.0
  • Squid-cache squid 3.3.12
  • Squid-cache squid 3.0.stable5
  • Squid-cache squid 3.5.18
  • Squid-cache squid 3.5.20
  • Squid-cache squid 3.5.8
  • Squid-cache squid 3.0.stable3
  • Squid-cache squid 3.0.stable19
  • Squid-cache squid 3.3.3
  • Squid-cache squid 3.5.16
  • Canonical ubuntu_linux 19.10
  • Squid-cache squid 3.1.12.2
  • Squid-cache squid 3.1.0.5
  • Squid-cache squid 3.0.stable1
  • Squid-cache squid 3.5.14
  • Squid-cache squid 3.3.9
  • Squid-cache squid 3.4.4.2
  • Squid-cache squid 3.2.0.13
  • Squid-cache squid 3.5.12
  • Squid-cache squid 3.1.0.2
  • Squid-cache squid 4.7
  • Squid-cache squid 3.4.9
  • Squid-cache squid 3.0.stable13
  • Squid-cache squid 3.1.0.12
  • Squid-cache squid 3.5.10
  • Squid-cache squid 2.5.stable13
  • Squid-cache squid 3.2.0.19
  • Squid-cache squid 3.0.stable11
  • Squid-cache squid 3.2.0.9
  • Squid-cache squid 2.5.stable11
  • Squid-cache squid 3.0.stable9
  • Squid-cache squid 3.2.0.15
  • Squid-cache squid 3.0.stable17
  • Squid-cache squid 3.1.0.17
  • Squid-cache squid 3.1.3
  • Squid-cache squid 3.4.3
  • Squid-cache squid 3.0.stable15
  • Squid-cache squid 3.3.5
  • Squid-cache squid 3.5.0.3
  • Squid-cache squid 3.1.0.15
  • Squid-cache squid 3.1.13
  • Squid-cache squid 3.1.11
  • Squid-cache squid 4.0.9
  • Squid-cache squid 3.5.0.1
  • Squid-cache squid 3.1.0.13
  • Squid-cache squid 3.4.0.4
  • Squid-cache squid 4.0.10
  • Squid-cache squid 3.1.0.3
  • Squid-cache squid 3.2.0.18
  • Squid-cache squid 2.3
  • Squid-cache squid 4.0.25
  • Squid-cache squid 3.3.7
  • Squid-cache squid 3.2.12
  • Squid-cache squid 4.0.12
  • Squid-cache squid 3.1.0.10
  • Squid-cache squid 2.1
  • Squid-cache squid 3.2.0.3
  • Squid-cache squid 3.5.26
  • Squid-cache squid 3.2.10
  • Squid-cache squid 4.0.14
  • Squid-cache squid 3.1.8
  • Squid-cache squid 3.2.13
  • Squid-cache squid 2.7
  • Squid-cache squid 3.2.0.5
  • Squid-cache squid 3.5.24
  • Squid-cache squid 3.4.11
  • Canonical ubuntu_linux 19.04
  • Squid-cache squid 4.0.16
  • Squid-cache squid 4.0.1
  • Squid-cache squid 2.5
  • Squid-cache squid 3.2.0.7
  • Squid-cache squid 3.5.22
  • Squid-cache squid 3.1.0.1
  • Squid-cache squid 3.5.7
  • Squid-cache squid 4.0.18
  • Squid-cache squid 3.3.0.2
  • Squid-cache squid 4.0.3
  • Squid-cache squid 3.1.0.11
  • Squid-cache squid 2.5.stable9
  • Squid-cache squid 3.2.8
  • Squid-cache squid 3.5.5
  • Squid-cache squid 3.1.2
  • Squid-cache squid 3.4.0.2
  • Squid-cache squid 4.0.5
  • Squid-cache squid 4.6
  • Squid-cache squid 2.5.stable7
  • Squid-cache squid 3.2.0.12
  • Squid-cache squid 3.5.3
  • Squid-cache squid 3.0.stable8
  • Squid-cache squid 2.5.stable5
  • Squid-cache squid 3.0.stable25
  • Squid-cache squid 3.3.0.3
  • Squid-cache squid 2.2
  • Squid-cache squid 3.3.6
  • Squid-cache squid 3.4.0.3
  • Squid-cache squid 3.1.0.4
  • Squid-cache squid 4.0.11
  • Squid-cache squid 3.2.0.4
  • Squid-cache squid 2.0
  • Squid-cache squid 4.0.24
  • Squid-cache squid 3.5.27
  • Squid-cache squid 3.2.11
  • Squid-cache squid 4.0.13
  • Squid-cache squid 3.1.0.16
  • Squid-cache squid 3.4.4
  • Squid-cache squid 2.6
  • Squid-cache squid 3.2.0.2
  • Squid-cache squid 3.5.25
  • Squid-cache squid 3.3.14
  • Squid-cache squid 4.0.15
  • Squid-cache squid 3.1.9
  • Squid-cache squid 3.3.13
  • Canonical ubuntu_linux 16.04
  • Squid-cache squid 2.4
  • Squid-cache squid 2.5.stable8
  • Squid-cache squid 3.5.23
  • Squid-cache squid 3.4.1
  • Squid-cache squid 3.5.6
  • Squid-cache squid 4.0.17
  • Squid-cache squid 4.0.23
  • Squid-cache squid 4.0.2
  • Squid-cache squid 4.0.22
  • Squid-cache squid 3.5.21
  • Squid-cache squid 3.2.9
  • Squid-cache squid 3.5.4
  • Squid-cache squid 4.0.19
  • Squid-cache squid 3.3.1
  • Squid-cache squid 4.0.4
  • Squid-cache squid 2.5.stable6
  • Squid-cache squid 3.5.2
  • Squid-cache squid 3.4.14
  • Squid-cache squid 4.8
  • Squid-cache squid 4.0.6
  • Squid-cache squid 2.5.stable4
  • Squid-cache squid 3.2.5
  • Squid-cache squid 3.1.1
  • Squid-cache squid 3.2.0.6
  • Squid-cache squid 3.4.8
  • Squid-cache squid 3.1
  • Squid-cache squid 2.5.stable2
  • Squid-cache squid 3.2.0.1
  • Squid-cache squid 3.2.7
  • Squid-cache squid 3.1.23
  • Squid-cache squid 3.1.7
  • Squid-cache squid 3.1.0.7
  • Squid-cache squid 3.1.0.14
  • Fedoraproject fedora 31
  • Squid-cache squid 3.0.stable22
  • Squid-cache squid 3.2.1
  • Squid-cache squid 3.0.stable7
  • Squid-cache squid 4.0.20
  • Squid-cache squid 3.1.5
  • Canonical ubuntu_linux 18.04
  • Squid-cache squid 3.1.0.9
  • Squid-cache squid 3.0.stable20
  • Squid-cache squid 3.2.3
  • Squid-cache squid 3.2.14
  • Squid-cache squid 3.2.4
  • Squid-cache squid 3.1.6
  • Squid-cache squid 3.5.1
  • Squid-cache squid 3.1.0.6
  • Squid-cache squid 3.0.stable24
  • Squid-cache squid 3.0
  • Squid-cache squid 2.5.stable3
  • Squid-cache squid 3.0.stable23
  • Squid-cache squid 3.2.6
  • Squid-cache squid 3.0.stable6
  • Squid-cache squid 3.4.13
  • Squid-cache squid 3.4.0.1
  • Squid-cache squid 2.5.stable1
  • Squid-cache squid 3.0.stable21
  • Squid-cache squid 3.2.0.11
  • Squid-cache squid 3.0.stable4
  • Squid-cache squid 3.2.2
  • Squid-cache squid 3.4.10
  • Squid-cache squid 3.0.stable2
  • Squid-cache squid 3.0.stable18
  • Squid-cache squid 3.5.19
  • Squid-cache squid 3.1.5.1
  • Squid-cache squid 3.5.9
  • Squid-cache squid 3.1.15
  • Squid-cache squid 3.5.17
  • Squid-cache squid 3.3.8
  • Squid-cache squid 3.2.0.10
  • Squid-cache squid 3.3.10
  • Squid-cache squid 3.5.15
  • Squid-cache squid 3.1.4
  • Squid-cache squid 3.4.4.1
  • Squid-cache squid 3.1.12.1
  • Squid-cache squid 3.0.stable12
  • Squid-cache squid 3.1.14
  • Squid-cache squid 3.5.13
  • Squid-cache squid 3.1.0.8
  • Squid-cache squid 2.5.stable12
  • Squid-cache squid 4.0
  • Squid-cache squid 3.1.12.3
  • Squid-cache squid 3.0.stable10
  • Squid-cache squid 3.5.11
  • Squid-cache squid 3.1.0.18
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out