{"id":3796,"date":"2019-01-11T06:51:49","date_gmt":"2019-01-11T06:51:49","guid":{"rendered":"https:\/\/www.camcert.gov.kh\/?p=3796"},"modified":"2019-01-11T07:02:18","modified_gmt":"2019-01-11T07:02:18","slug":"19-03-juniper-network-release-security-updates-january","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/19-03-juniper-network-release-security-updates-january\/","title":{"rendered":"19-03: \u1780\u17d2\u179a\u17bb\u1798\u17a0\u17ca\u17bb\u1793 Juniper Network \u1785\u17c1\u1789\u1795\u17d2\u179f\u17b6\u1799\u17a2\u17c6\u1796\u17b8\u1780\u17b6\u179a\u17a2\u17b6\u1794\u17cb\u178a\u17c1\u178f\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178a\u17be\u1798\u17d2\u1794\u17b8\u1787\u17bd\u179f\u1787\u17bb\u179b\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799\u1787\u17b6\u1785\u17d2\u179a\u17be\u1793"},"content":{"rendered":"<p><strong>\u17e1.\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1791\u17bc\u1791\u17c5<\/strong><\/p>\n<p style=\"text-align: left;\">\u1780\u17d2\u179a\u17bb\u1798\u17a0\u17ca\u17bb\u1793 Juniper Networks \u178a\u17c2\u179b\u178f\u17d2\u179a\u17bc\u1794\u17b6\u1793\u1782\u17c1\u179f\u17d2\u1782\u17b6\u179b\u17cb\u1790\u17b6\u1787\u17b6\u1780\u17d2\u179a\u17bb\u1798\u17a0\u17ca\u17bb\u1793\u179b\u17d2\u1794\u17b8\u179b\u1794\u17d2\u1794\u17b6\u1789\u179b\u1780\u17cb\u17a7\u1794\u1780\u179a\u178e\u17cd\u1794\u178e\u17d2\u178f\u17b6\u1789\u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6\u17d6 routers, switches \u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789 \u1793\u17b7\u1784\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1794\u178e\u17d2\u178f\u17b6\u1789 \u1794\u17b6\u1793\u1794\u1789\u17d2\u1785\u17c1\u1789\u1780\u17b6\u179a\u17a2\u17b6\u1794\u17cb\u178a\u17c1\u178f\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1787\u17b6\u1785\u17d2\u179a\u17be\u1793 \u178a\u17be\u1798\u17d2\u1794\u17b8\u178a\u17c4\u17c7\u1787\u17bd\u179f\u1787\u17bb\u179b\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799\u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784\u1795\u179b\u17b7\u178f\u1795\u179b Juniper \u1795\u17d2\u179f\u17c1\u1784\u17d7\u17d4 \u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1796\u17b8\u1785\u1798\u17d2\u1784\u17b6\u1799\u17a2\u17b6\u1785\u179c\u17b6\u1799\u179b\u17bb\u1780\u179b\u17be\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799 \u1791\u17b6\u17c6\u1784\u1793\u17c1\u17c7 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u178a\u17c2\u179b\u179a\u1784\u1795\u179b\u1794\u17c9\u17c7\u1796\u17b6\u179b\u17cb\u17d4<\/p>\n<p><strong>\u17e2.\u1795\u179b\u17b7\u178f\u1795\u179b\u179a\u1784\u1795\u179b\u1794\u17c9\u17c7\u1796\u17b6\u179b\u17cb<\/strong><\/p>\n<table width=\"100%\">\n<thead>\n<tr>\n<td><strong>Status<\/strong><\/td>\n<td><strong>Version<\/strong><\/td>\n<td><strong><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;channel=SECURITY_ADVISORIES&amp;cat=SIRT_1&amp;sort=documentid&amp;dir=descending&amp;max=1000&amp;batch=15&amp;rss=true\">ID<\/a><\/strong><\/td>\n<td width=\"49%\"><strong><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;channel=SECURITY_ADVISORIES&amp;cat=SIRT_1&amp;sort=indexmasteridentifiers&amp;dir=descending&amp;max=1000&amp;batch=15&amp;rss=true\">Title<\/a> <\/strong><\/td>\n<td><strong><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;channel=SECURITY_ADVISORIES&amp;cat=SIRT_1&amp;sort=views&amp;&amp;actp=&amp;dir=descending&amp;max=1000&amp;batch=15&amp;rss=true\">Views<\/a> <\/strong><\/td>\n<td><strong><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;channel=SECURITY_ADVISORIES&amp;cat=SIRT_1&amp;sort=datemodified&amp;&amp;actp=&amp;dir=ascending&amp;max=1000&amp;batch=15&amp;rss=true\">Last Updated <\/a><\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10913&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10913<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10913&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: RPD crash upon receipt of malformed PIM packet (CVE-2019-0013) <\/a><\/td>\n<td>6,359<\/td>\n<td width=\"12%\">7 hours ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10912&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10912<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10912&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: rpd crash on VPLS PE upon receipt of specific BGP message (CVE-2019-0012) <\/a><\/td>\n<td>5,684<\/td>\n<td width=\"12%\">7 hours ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10911&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10911<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10911&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: Kernel crash after processing specific incoming packet to the out of band management interface (CVE-2019-0011) <\/a><\/td>\n<td>6,329<\/td>\n<td width=\"12%\">7 hours ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10906&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10906<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10906&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: EX, QFX and MX series: Packet Forwarding Engine manager (FXPC) process crashes due to a crafted HTTP packet in a Virtual Chassis configuration (CVE-2019-0006) <\/a><\/td>\n<td>10,963<\/td>\n<td width=\"12%\">7 hours ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10905&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10905<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10905&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: EX and QFX series: Stateless firewall filter ignores IPv6 extension headers (CVE-2019-0005) <\/a><\/td>\n<td>6,853<\/td>\n<td width=\"12%\">10 hours ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10900&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10900<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10900&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber management daemon (bbe-smgd). (CVE-2019-0001) <\/a><\/td>\n<td>10,713<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10901&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10901<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10901&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: EX2300 and EX3400 series: Certain stateless firewall filter rules might not take effect (CVE-2019-0002) <\/a><\/td>\n<td>7,495<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10902&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10902<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10902&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: A flowspec BGP update with a specific term-order causes routing protocol daemon (rpd) process to crash with a core. (CVE-2019-0003) <\/a><\/td>\n<td>8,978<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10903&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10903<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10903&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: vMX series: Predictable IP ID sequence numbers vulnerability (CVE-2019-0007) <\/a><\/td>\n<td>6,436<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10904&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10904<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10904&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: FreeBSD-SA-15:20.expat : Multiple integer overflows in expat (libbsdxml) XML parser (CVE-2015-1283) <\/a><\/td>\n<td>8,067<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10907&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10907<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10907&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: SRC Series: Multiple vulnerabilities in Juniper Networks Session and Resource Control (SRC) <\/a><\/td>\n<td>5,272<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10909&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10909<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10909&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: EX2300 and EX3400: High disk I\/O operations may disrupt the communication between RE and PFE (CVE-2019-0009) <\/a><\/td>\n<td>6,091<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10910&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10910<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10910&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: SRX Series: Crafted HTTP traffic may cause UTM to consume all mbufs, leading to Denial of Service (CVE-2019-0010) <\/a><\/td>\n<td>8,589<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10914&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10914<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10914&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packet (CVE-2019-0014) <\/a><\/td>\n<td>3,777<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10915&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10915<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10915&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections until reboot (CVE-2019-0015) <\/a><\/td>\n<td>4,612<\/td>\n<td width=\"12%\">1 day ag<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10916&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10916<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10916&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: Multiple vulnerabilities in libxml2 <\/a><\/td>\n<td>7,632<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10917&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10917<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10917&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos Space: Multiple vulnerabilities resolved in 18.3R1 and 18.4R1 releases <\/a><\/td>\n<td>5,208<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10918&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10918<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10918&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Juniper ATP: Multiple vulnerabilities resolved in 5.0.3 and 5.0.4 <\/a><\/td>\n<td>6,385<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<tr>\n<td width=\"6%\"><\/td>\n<td width=\"12%\">Published<\/td>\n<td><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10919&amp;cat=SIRT_1&amp;actp=LIST&amp;showDraft=false\">JSA10919<\/a><\/td>\n<td width=\"49%\"><a href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=JSA10919&amp;cat=SIRT_1&amp;actp=LIST\">2019-01 Security Bulletin: Junos OS: OpenSSL Security Advisories [16 Apr 2018] and [12 June 2018] <\/a><\/td>\n<td>5,843<\/td>\n<td width=\"12%\">1 day ago<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u17e3.\u1780\u17b6\u179a\u178e\u17c2\u1793\u17b6\u17c6<\/strong><\/p>\n<p>\u17a2\u1797\u17b7\u1794\u17b6\u179b\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1791\u17c5\u179b\u17be\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u1793\u17b7\u1784\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1795\u179b\u17b7\u178f\u1795\u179b Juniper \u1782\u17bd\u179a\u178f\u17c2\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u17a2\u17b6\u1794\u17cb\u178a\u17c1\u178f\u1791\u17c5\u1780\u17b6\u1793\u17cb\u1780\u17c6\u178e\u17c2\u1785\u17bb\u1784\u1780\u17d2\u179a\u17c4\u1799\u1794\u1784\u17d2\u17a2\u179f\u17cb \u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u17b6\u179a\u1798\u17b7\u1793\u17b1\u17d2\u1799\u1798\u17b6\u1793\u1780\u17b6\u179a\u179c\u17b6\u1799\u179b\u17bb\u1780\u1791\u17c5\u179b\u17be\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799\u1793\u17c1\u17c7\u17d4<\/p>\n<p>\u178f\u17c6\u178e\u1797\u17d2\u1787\u17b6\u1794\u17cb\u1791\u17c5\u1780\u17b6\u1793\u17cb\u1791\u17c6\u1796\u17d0\u179a\u1793\u17c3\u1780\u17b6\u179a\u17a2\u17b6\u1794\u17cb\u178a\u17c1\u178f<\/p>\n<ul>\n<li><a href=\"https:\/\/support.juniper.net\/support\/downloads\/\">https:\/\/support.juniper.net\/support\/downloads\/<\/a><\/li>\n<\/ul>\n<p><strong>\u17e4.\u17af\u1780\u179f\u17b6\u179a\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792<\/strong><\/p>\n<ul>\n<li>https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/01\/09\/Juniper-Networks-Releases-Multiple-Security-Updates<\/li>\n<li>https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;channel=SECURITY_ADVISORIES<\/li>\n<\/ul>\n<p><\/p>"},"excerpt":{"rendered":"<p>\u17e1.\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1791\u17bc\u1791\u17c5 \u1780\u17d2\u179a\u17bb\u1798\u17a0\u17ca\u17bb\u1793 Juniper Networks \u178a\u17c2\u179b\u178f\u17d2\u179a\u17bc\u1794\u17b6\u1793\u1782\u17c1\u179f\u17d2\u1782\u17b6\u179b\u17cb\u1790\u17b6\u1787\u17b6\u1780\u17d2\u179a\u17bb\u1798\u17a0\u17ca\u17bb\u1793\u179b\u17d2\u1794\u17b8\u179b\u1794\u17d2\u1794\u17b6\u1789\u179b\u1780\u17cb\u17a7\u1794\u1780\u179a\u178e\u17cd\u1794\u178e\u17d2\u178f\u17b6\u1789\u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6\u17d6 routers, switches \u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789 \u1793\u17b7\u1784\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1794\u178e\u17d2\u178f\u17b6\u1789 \u1794\u17b6\u1793\u1794\u1789\u17d2\u1785\u17c1\u1789\u1780\u17b6\u179a\u17a2\u17b6\u1794\u17cb\u178a\u17c1\u178f\u1793\u17c3\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u1787\u17b6\u1785\u17d2\u179a\u17be\u1793 \u178a\u17be\u1798\u17d2\u1794\u17b8\u178a\u17c4\u17c7\u1787\u17bd\u179f\u1787\u17bb\u179b\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799\u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784\u1795\u179b\u17b7\u178f\u1795\u179b Juniper \u1795\u17d2\u179f\u17c1\u1784\u17d7\u17d4 \u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1796\u17b8\u1785\u1798\u17d2\u1784\u17b6\u1799\u17a2\u17b6\u1785\u179c\u17b6\u1799\u179b\u17bb\u1780\u179b\u17be\u1785\u17c6\u1793\u17bb\u1785\u1781\u17d2\u179f\u17c4\u1799 \u1791\u17b6\u17c6\u1784\u1793\u17c1\u17c7 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u178a\u17c2\u179b\u179a\u1784\u1795\u179b\u1794\u17c9\u17c7\u1796\u17b6\u179b\u17cb\u17d4 \u17e2.\u1795\u179b\u17b7\u178f\u1795\u179b\u179a\u1784\u1795\u179b\u1794\u17c9\u17c7\u1796\u17b6\u179b\u17cb Status Version ID Title Views Last Updated Published JSA10913 2019-01 Security Bulletin: Junos OS: RPD crash upon receipt of malformed PIM packet (CVE-2019-0013) 6,359 7 hours ago Published JSA10912 2019-01 Security Bulletin: Junos OS: rpd crash on VPLS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3794,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[274,9],"tags":[277,278],"class_list":["post-3796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-274","category-security-alert","tag-juniper-advisory","tag-juniper-security-updates"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=3796"}],"version-history":[{"count":6,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3796\/revisions"}],"predecessor-version":[{"id":3798,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/3796\/revisions\/3798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media\/3794"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=3796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=3796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=3796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}