First published: Wed Oct 09 2019(Updated: )
A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.1X75 all versions. Versions before 18.1R1 are not affected.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | =18.1-r2 | |
Juniper Junos | =18.1-r2-s1 | |
Juniper Junos | =18.1-r2-s2 | |
Juniper Junos | =18.1-r3 | |
Juniper Junos | =18.1x75 | |
Juniper Junos | =18.1x75-d10 |
The following software releases have been updated to resolve this specific issue: 18.1R2-S4, 18.1R3-S1, 18.2X75-D5, 18.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0059 has been assigned a high severity rating due to its potential to cause a Denial of Service (DoS).
To remediate CVE-2019-0059, upgrade your Junos OS to a non-vulnerable version as specified by Juniper Networks.
CVE-2019-0059 affects specific versions of Juniper Networks Junos OS, including 18.1 and various releases within that version.
CVE-2019-0059 can lead to a memory leak and potentially result in a Denial of Service for the affected Juniper devices.
Yes, CVE-2019-0059 can be exploited remotely by an attacker sending specific commands from a peered BGP host.