|
|
|
Juniper Junos MPLS Buffer Memory Leak Lets Remote Users Consume Excessive Buffer Memory Resources
|
SecurityTracker Alert ID: 1040790 |
SecurityTracker URL: http://securitytracker.com/id/1040790
|
CVE Reference:
CVE-2018-0022
(Links to External Site)
|
Date: Apr 28 2018
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 12.1X46, 12.3X48, 14.1, 14.1X53, 14.2, 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2
|
Description:
A vulnerability was reported in Juniper Junos. A remote user can consume excessive buffer memory on the target system.
A remote user can send a specially crafted MPLS packet to a target device interface that has VPLS routing-instances configured on the interface to trigger an mbuf leak. When the target device mbuf buffers are exhausted, the device will become inaccessible. A restart is required to return the system to normal operations.
IPv4 traffic is affected.
The vendor has assigned PR 1272898 to this vulnerability.
|
Impact:
A remote user can cause the target device to become inaccessible. A restart is required to return the system to normal operations.
|
Solution:
The vendor has issued a fix (12.1X46-D76, 12.3X48-D66, 12.3X48-D70, 14.1R9, 14.1X53-D47, 14.2R8, 15.1F2-S19, 15.1F6-S10, 15.1R4-S9, 15.1R5-S7, 15.1R6-S4, 15.1R7, 15.1X49-D131, 15.1X49-D140, 15.1X53-D233, 15.1X53-D471, 15.1X53-D58, 15.1X53-D66, 16.1R3-S8, 16.1R4-S6, 16.1R5, 16.2R1-S6, 16.2R2-S5, 16.2R3, 17.1R1-S7, 17.1R2-S6, 17.1R3, 17.2R1-S5, 17.2R2, 17.3R1).
The vendor advisory is available at:
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10855
|
Vendor URL: kb.juniper.net/InfoCenter/index?page=content&id=JSA10855 (Links to External Site)
|
Cause:
Resource error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|
Go to the Top of This SecurityTracker Archive Page
|