An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10965 | Vendor Advisory |
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html | Vendor Advisory |
https://kb.juniper.net/JSA10965 | Vendor Advisory |
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA10965 - Vendor Advisory | |
References | () https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html - Vendor Advisory |
Information
Published : 2019-10-09 20:15
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0066
Mitre link : CVE-2019-0066
CVE.ORG link : CVE-2019-0066
JSON object : View
Products Affected
juniper
- srx1400
- srx300
- srx4600
- srx3600
- srx210
- junos
- srx550_hm
- srx340
- srx550
- srx4200
- srx3400
- csrx
- srx5800
- srx345
- srx1500
- srx220
- srx650
- srx5600
- srx5400
- srx100
- srx110
- srx320
- srx240
- vsrx
- srx4100
CWE