Advisory Published
Updated

CVE-2017-2346: MS-MPC or MS-MIC crash when passing large fragmented traffic through an ALG

First published: Fri Jul 14 2017(Updated: )

An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1182910 in Junos OS 14.1X55-D30, 14.1X55-D35, 14.2R7, 15.1R5, and 16.1R2. No other versions of Junos OS and no other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS on MX platforms running: 14.1X55 from 14.1X55-D30 to releases prior to 14.1X55-D35; 14.2R from 14.2R7 to releases prior to 14.2R7-S4, 14.2R8; 15.1R from 15.1R5 to releases prior to 15.1R5-S2, 15.1R6; 16.1R from 16.1R2 to releases prior to 16.1R3-S2, 16.1R4.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=14.1x55
Junos OS Evolved=14.1x55-d30
Junos OS Evolved=14.2-r
Junos OS Evolved=14.2-r1
Junos OS Evolved=14.2-r2
Junos OS Evolved=14.2-r3
Junos OS Evolved=14.2-r4
Junos OS Evolved=14.2-r5
Junos OS Evolved=14.2-r6
Junos OS Evolved=14.2-r7
Junos OS Evolved=15.1-r
Junos OS Evolved=15.1-r1
Junos OS Evolved=15.1-r2
Junos OS Evolved=15.1-r3
Junos OS Evolved=15.1-r4
Junos OS Evolved=15.1-r5
Junos OS Evolved=15.1-r6
Junos OS Evolved=16.1-r
Junos OS Evolved=16.1-r1
Junos OS Evolved=16.1-r2
Junos OS Evolved=16.1-r3
Junos OS Evolved=16.1-r4
Juniper MX Series

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-2346?

    The severity of CVE-2017-2346 is classified as high due to its potential to cause denial of service.

  • How do I fix CVE-2017-2346?

    To fix CVE-2017-2346, update your Junos software to a version that is not affected by this vulnerability.

  • What systems are affected by CVE-2017-2346?

    CVE-2017-2346 affects multiple versions of Juniper's Junos, including versions 14.1x55, 14.2, and 15.1.

  • What is the impact of CVE-2017-2346?

    The impact of CVE-2017-2346 is an extended denial of service condition due to service crashes when handling large fragmented packets.

  • Can CVE-2017-2346 be exploited remotely?

    Yes, CVE-2017-2346 can be exploited remotely if the affected device is accessible over the network.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203