7.5
CWE
19
Advisory Published
Updated

CVE-2019-0014: Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packet

First published: Tue Jan 15 2019(Updated: )

On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. By continuously sending the offending packet, an attacker can repeatedly crash the FPC process causing a sustained Denial of Service (DoS). This issue affects both IPv4 and IPv6 packet processing. Affected releases are Juniper Networks Junos OS on QFX and PTX Series: 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R1-S3, 18.2R2; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D100.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper JUNOS=17.2x75-d102
Juniper JUNOS=17.2x75-d50
Juniper JUNOS=17.2x75-d70
Juniper JUNOS=17.4
Juniper JUNOS=17.4-r1
Juniper JUNOS=17.4-r2
Juniper JUNOS=18.2-r1
Juniper Ptx1000
Juniper Ptx10002
Juniper Ptx10008
Juniper Ptx10016
Juniper Ptx3000
Juniper Ptx5000
Juniper Qfx10002
Juniper Qfx10008
Juniper Qfx10016
Juniper Qfx3500
Juniper Qfx3600
Juniper Qfx5100
Juniper Qfx5110
Juniper Qfx5120
Juniper Qfx5200
Juniper Qfx5210

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS 17.2X75-D91, 17.2X75-D100, 17.4R2-S1, 17.4R3, 18.1R3-S1, 18.2R1-S3, 18.2R2, 18.2X75-D5, 18.3R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-0014?

    The severity of CVE-2019-0014 is considered high with a severity value of 7.5.

  • Which Juniper products are affected by CVE-2019-0014?

    QFX and PTX Series running Juniper JUNOS versions 17.2x75-d102, 17.2x75-d50, 17.2x75-d70, 17.4, 17.4-r1, 17.4-r2, and 18.2-r1 are affected by CVE-2019-0014.

  • How can an attacker exploit CVE-2019-0014?

    An attacker can exploit CVE-2019-0014 by continuously sending a malformed packet for J-Flow sampling, which can crash the FPC process and cause a Denial of Service (DoS) condition.

  • What is the impact of CVE-2019-0014?

    The impact of CVE-2019-0014 is that it can crash the FPC process, causing all interfaces to go down and resulting in a sustained Denial of Service (DoS) condition.

  • Are Juniper QFX10002, QFX10008, QFX10016, QFX3500, QFX3600, QFX5100, QFX5110, QFX5120, QFX5200, QFX5210, PTX1000, PTX10002, PTX10008, PTX10016, PTX3000, and PTX5000 vulnerable to CVE-2019-0014?

    No, Juniper QFX10002, QFX10008, QFX10016, QFX3500, QFX3600, QFX5100, QFX5110, QFX5120, QFX5200, QFX5210, PTX1000, PTX10002, PTX10008, PTX10016, PTX3000, and PTX5000 are not vulnerable to CVE-2019-0014.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203