First published: Wed Oct 10 2018(Updated: )
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =12.1x46-d76 | |
Junos OS Evolved | =12.1x46-d77 | |
Junos OS Evolved | =12.3x48-d66 | |
Junos OS Evolved | =12.3x48-d70 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX1500 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX240H2 | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX3400 | ||
Juniper SRX345 | ||
Juniper SRX3600 | ||
Juniper SRX380 | ||
Juniper SRX4000 | ||
Juniper SRX4100 | ||
Juniper SRX4200 | ||
Juniper SRX4600 | ||
Junos OS SRX 5000 Series | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
Juniper SRX5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 | ||
Junos OS Evolved | =12.3-r12-s10 | |
Junos OS Evolved | =15.1-f6-s10 | |
Junos OS Evolved | =15.1-f6-s12 | |
Junos OS Evolved | =15.1-f7 | |
Junos OS Evolved | =15.1-r | |
Junos OS Evolved | =15.1-r1 | |
Junos OS Evolved | =15.1-r2 | |
Junos OS Evolved | =15.1-r3 | |
Junos OS Evolved | =15.1-r4 | |
Junos OS Evolved | =15.1-r4-s7 | |
Junos OS Evolved | =15.1-r4-s8 | |
Junos OS Evolved | =15.1-r4-s9 | |
Junos OS Evolved | =15.1-r5 | |
Junos OS Evolved | =15.1-r5-s1 | |
Junos OS Evolved | =15.1-r5-s3 | |
Junos OS Evolved | =15.1-r5-s5 | |
Junos OS Evolved | =15.1-r5-s6 | |
Junos OS Evolved | =15.1-r6 | |
Junos OS Evolved | =15.1-r6-s1 | |
Junos OS Evolved | =15.1-r6-s2 | |
Junos OS Evolved | =15.1-r6-s3 | |
Junos OS Evolved | =15.1-r6-s4 | |
Junos OS Evolved | =15.1-r6-s6 | |
Junos OS Evolved | =15.1-r7 | |
Junos OS Evolved | =15.1-r7-s1 | |
Junos OS Evolved | =16.1-r3-s8 | |
Junos OS Evolved | =16.1-r4 | |
Junos OS Evolved | =16.1-r4-s2 | |
Junos OS Evolved | =16.1-r4-s3 | |
Junos OS Evolved | =16.1-r4-s4 | |
Junos OS Evolved | =16.1-r4-s6 | |
Junos OS Evolved | =16.1-r4-s8 | |
Junos OS Evolved | =16.1-r4-s9 | |
Junos OS Evolved | =16.1-r5-s4 | |
Junos OS Evolved | =16.1-r6 | |
Junos OS Evolved | =16.1-r6-s1 | |
Junos OS Evolved | =16.1-r6-s3 | |
Junos OS Evolved | =16.1-r6-s4 | |
Junos OS Evolved | =16.1-r7 | |
Junos OS Evolved | =16.2-r1-s6 | |
Junos OS Evolved | =16.2-r2 | |
Junos OS Evolved | =16.2-r2-s1 | |
Junos OS Evolved | =16.2-r2-s10 | |
Junos OS Evolved | =16.2-r2-s2 | |
Junos OS Evolved | =16.2-r2-s5 | |
Junos OS Evolved | =16.2-r2-s6 | |
Junos OS Evolved | =17.1-r1-s7 | |
Junos OS Evolved | =17.1-r2-s7 | |
Junos OS Evolved | =17.1-r2-s8 | |
Junos OS Evolved | =17.2-r1-s6 | |
Junos OS Evolved | =17.2-r2-s4 | |
Junos OS Evolved | =17.2x75-d100 | |
Junos OS Evolved | =18.2x75-d12 | |
Junos OS Evolved | =18.2x75-d5 | |
Junos OS Evolved | =14.1x53-d47 | |
Juniper EX2200-C | ||
Juniper EX2200 | ||
Juniper EX3200 | ||
Juniper EX3300-VX | ||
Juniper EX3300-VX | ||
Juniper EX Series | ||
Juniper EX4300-24T | ||
Juniper EX Series | ||
Juniper EX4550 | ||
Juniper EX4600 | ||
Juniper EX6200 | ||
Juniper EX Series | ||
Juniper EX8200 | ||
Juniper Networks QFX-Series | ||
Juniper QFX3600-I | ||
Juniper QFX5100 | ||
Junos OS Evolved | =15.1x49-d131 | |
Junos OS Evolved | =15.1x49-d140 | |
Junos OS Evolved | =17.3-r1-s4 | |
Junos OS Evolved | =17.3-r2 | |
Junos OS Evolved | =17.3-r2-s1 | |
Junos OS Evolved | =17.3-r2-s2 | |
Junos OS Evolved | =17.3-r2-s3 | |
Junos OS Evolved | =17.3-r3 | |
Junos OS Evolved | =17.4-r1-s3 | |
Junos OS Evolved | =17.4-r1-s4 | |
Junos OS Evolved | =17.4-r2 | |
Junos OS Evolved | =18.1-r2 | |
Junos OS Evolved | =18.1-r2-s1 | |
Junos OS Evolved | =18.1-r2-s2 | |
Junos OS Evolved | =18.2-r1 | |
Juniper SRX240M | ||
Junos OS Evolved | =15.1x53-d233 | |
Junos OS Evolved | =15.1x53-d234 | |
Juniper QFX5110 | ||
Juniper QFX5200-32C | ||
Junos OS Evolved | =15.1x53-d471 | |
Junos OS Evolved | =15.1x53-d490 | |
Junos OS Evolved | =15.1x53-d495 | |
Juniper NFX | ||
Juniper NFX | ||
Junos OS Evolved | =15.1x53-d67 | |
Juniper Networks QFX-Series | ||
Juniper QFX10002-60C | ||
Juniper QFX10002 | ||
Juniper QFX10002 | ||
Juniper QFX10002 | ||
Juniper Networks QFX-Series | ||
Juniper Networks QFX-Series | ||
Junos OS Evolved | =15.1x53-d59 | |
Juniper EX2300-24T | ||
Juniper EX3400 |
The following software releases have been updated to resolve this specific issue: 12.1X46-D81, 12.3R12-S11, 12.3X48-D75, 14.1X53-D130, 14.1X53-D48, 15.1R7-S2, 15.1X49-D150, 5.1X53-D235, 15.1X53-D495, 15.1X53-D68, 15.1X53-D590, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.1X65-D48, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2X75-D101, 17.2X75-D110, 17.3R2-S4, 17.3R3-S1, 17.3R4, 17.4R1-S5, 17.4R2-S1, 17.4R3, 18.1R2-S3, 18.1R3, 18.2R1-S2, 18.2R1-S3, 18.2R2, 18.2X75-D20, 18.3R1, and all subsequent releases. Additionally, the following software releases have been re-released to the Juniper download pages to resolve this specific issue: 12.1X46-D76.1, 12.3X48-D70.4, 14.1X53-D47.6, 15.1F6-S10.11, 15.1R6-S6.2, 15.1R7.9, 15.1X49-D140.3, 15.1X53-D233.2, 15.1X53-D59.4, 15.1X53-D67.6, 16.1R6-S3.2, 16.1R7-S1.2, 16.1R7.8, 17.2X75-D100.6, 17.3R2-S2.2, 17.3R3.10, 17.4R1-S3.4, 18.1R2.6. Note: The final ".xy" numeric entry, for example the .4 in 12.3X48-D70.4, on a release in this notice is the respin release number. Customer's should check the respin release number on the version of Junos OS to confirm vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0049 is classified as high due to the potential for Denial of Service attacks.
To fix CVE-2018-0049, upgrade Juniper Networks Junos OS to a version that includes the patch addressing this vulnerability.
CVE-2018-0049 can cause the Junos OS kernel to crash, leading to a persistent Denial of Service condition on affected devices.
CVE-2018-0049 affects Junos OS versions 12.1x46-d76, 12.1x46-d77, 12.3x48-d66, 12.3x48-d70, and others listed in the vulnerability details.
You can determine vulnerability to CVE-2018-0049 by checking the version of Junos OS running on your device against the list of affected versions.