First published: Tue Jan 15 2019(Updated: )
An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which can be identified through the following log messages: all_logs.0:Jun 8 03:25:03 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 50%. all_logs.0:Jun 8 03:25:13 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 51%. all_logs.0:Jun 8 03:25:24 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 52%. ... Eventually the system runs out of mbufs and the system crashes (fails over) with the error "mbuf exceed". This issue only occurs when HTTP AV inspection is configured. Devices configured for Web Filtering alone are unaffected by this issue. Affected releases are Junos OS on SRX Series: 12.1X46 versions prior to 12.1X46-D81; 12.3X48 versions prior to 12.3X48-D77; 15.1X49 versions prior to 15.1X49-D101, 15.1X49-D110.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =12.1x46 | |
Junos OS Evolved | =12.1x46-d10 | |
Junos OS Evolved | =12.1x46-d15 | |
Junos OS Evolved | =12.1x46-d20 | |
Junos OS Evolved | =12.1x46-d25 | |
Junos OS Evolved | =12.1x46-d30 | |
Junos OS Evolved | =12.1x46-d35 | |
Junos OS Evolved | =12.1x46-d40 | |
Junos OS Evolved | =12.1x46-d45 | |
Junos OS Evolved | =12.1x46-d55 | |
Junos OS Evolved | =12.1x46-d60 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
Juniper SRX5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 | ||
Junos OS Evolved | =12.3x48-d10 | |
Junos OS Evolved | =12.3x48-d15 | |
Junos OS Evolved | =12.3x48-d25 | |
Junos OS Evolved | =12.3x48-d30 | |
Junos OS Evolved | =12.3x48-d35 | |
Junos OS Evolved | =12.3x48-d40 | |
Junos OS Evolved | =12.3x48-d45 | |
Junos OS Evolved | =12.3x48-d50 | |
Junos OS Evolved | =12.3x48-d55 | |
Junos OS Evolved | =12.3x48-d60 | |
Junos OS Evolved | =12.3x48-d65 | |
Junos OS Evolved | =12.3x48-d70 | |
Junos OS Evolved | =12.3x48-d75 | |
Junos OS Evolved | =15.1x49-d10 | |
Junos OS Evolved | =15.1x49-d100 | |
Junos OS Evolved | =15.1x49-d20 | |
Junos OS Evolved | =15.1x49-d30 | |
Junos OS Evolved | =15.1x49-d35 | |
Junos OS Evolved | =15.1x49-d40 | |
Junos OS Evolved | =15.1x49-d45 | |
Junos OS Evolved | =15.1x49-d50 | |
Junos OS Evolved | =15.1x49-d55 | |
Junos OS Evolved | =15.1x49-d60 | |
Junos OS Evolved | =15.1x49-d65 | |
Junos OS Evolved | =15.1x49-d70 | |
Junos OS Evolved | =15.1x49-d75 | |
Junos OS Evolved | =15.1x49-d80 | |
Junos OS Evolved | =15.1x49-d90 |
The following software releases have been updated to resolve this specific issue: Junos OS 12.1X46-D81, 12.3X48-D77, 15.1X49-D101, 15.1X49-D110, 17.3R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0010 has a medium severity rating due to memory buffer exhaustion that may lead to system crashes.
To fix CVE-2019-0010, you should update your Juniper JUNOS software to a version that addresses this vulnerability.
CVE-2019-0010 affects Juniper SRX Series Service Gateways running specific versions of JUNOS 12.1x46 and 12.3x48.
Exploitation of CVE-2019-0010 may result in system crashes with an "mbuf exceed" error message.
Currently, the best approach for CVE-2019-0010 is to implement software updates; no specific workarounds are provided.