First published: Tue Jan 15 2019(Updated: )
The Junos OS kernel crashes after processing a specific incoming packet to the out of band management interface (such as fxp0, me0, em0, vme0) destined for another address. By continuously sending this type of packet, an attacker can repeatedly crash the kernel causing a sustained Denial of Service. Affected releases are Juniper Networks Junos OS: 17.2 versions prior to 17.2R1-S7, 17.2R3; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S4, 17.4R2; 17.2X75 versions prior to 17.2X75-D110; 18.1 versions prior to 18.1R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | =17.2 | |
Juniper Junos | =17.2-r1 | |
Juniper Junos | =17.2-r1-s1 | |
Juniper Junos | =17.2-r1-s2 | |
Juniper Junos | =17.2-r1-s3 | |
Juniper Junos | =17.2-r1-s4 | |
Juniper Junos | =17.2-r1-s5 | |
Juniper Junos | =17.2-r1-s6 | |
Juniper Junos | =17.3 | |
Juniper Junos | =17.3-r1 | |
Juniper Junos | =17.3-r2 | |
Juniper Junos | =17.3-r3 | |
Juniper Junos | =17.3-r3-s1 | |
Juniper Junos | =17.3-r3-s2 | |
Juniper Junos | =17.4 | |
Juniper Junos | =17.4-r1 | |
Juniper Junos | =17.4-r1-s1 | |
Juniper Junos | =17.4-r1-s2 | |
Juniper Junos | =17.4-r1-s3 | |
Juniper Junos | =17.2x75 | |
Juniper Junos | =17.2x75-d100 | |
Juniper Junos | =17.2x75-d102 | |
Juniper Junos | =17.2x75-d50 | |
Juniper Junos | =17.2x75-d70 | |
Juniper Junos | =17.2x75-d90 | |
Juniper Junos | =17.2x75-d92 | |
Juniper Junos | =18.1 |
The following software releases have been updated to resolve this specific issue: Junos OS 17.2R1-S7, 17.2R3, 17.2X75-D110, 17.3R3-S3, 17.4R1-S4, 17.4R2, 18.1R2, 18.2R1, 18.2X75-D5, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0011 has a high severity rating due to its potential to crash the Junos OS kernel.
To fix CVE-2019-0011, it is recommended to upgrade to the latest version of Junos OS where the vulnerability has been addressed.
CVE-2019-0011 affects Junos OS versions 17.2, 17.3, 17.4, and earlier versions before the patch was applied.
CVE-2019-0011 allows attackers to repeatedly crash the kernel by sending a specific type of malicious packet.
There is no officially recommended workaround for CVE-2019-0011; updating to a patched version is the most effective mitigation.