First published: Wed Oct 09 2019(Updated: )
Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =16.1 | |
Juniper JUNOS | =16.1-r1 | |
Juniper JUNOS | =16.1-r2 | |
Juniper JUNOS | =16.1-r3 | |
Juniper JUNOS | =16.1-r3-s10 | |
Juniper JUNOS | =16.1-r3-s11 | |
Juniper JUNOS | =16.1-r4 | |
Juniper JUNOS | =16.1-r5-s4 | |
Juniper JUNOS | =16.1-r6-s1 | |
Juniper JUNOS | =16.2 | |
Juniper JUNOS | =16.2-r1 | |
Juniper JUNOS | =16.2-r2 | |
Juniper JUNOS | =16.2-r2-s1 | |
Juniper JUNOS | =16.2-r2-s2 | |
Juniper JUNOS | =16.2-r2-s5 | |
Juniper JUNOS | =16.2-r2-s6 | |
Juniper JUNOS | =16.2-r2-s7 | |
Juniper JUNOS | =16.2-r2-s8 | |
Juniper JUNOS | =16.2-r2-s9 | |
Juniper JUNOS | =17.1 | |
Juniper JUNOS | =17.1-r1 | |
Juniper JUNOS | =17.1-r2-s1 | |
Juniper JUNOS | =17.1-r2-s10 | |
Juniper JUNOS | =17.1-r2-s2 | |
Juniper JUNOS | =17.1-r2-s3 | |
Juniper JUNOS | =17.1-r2-s4 | |
Juniper JUNOS | =17.1-r2-s5 | |
Juniper JUNOS | =17.1-r2-s6 | |
Juniper JUNOS | =17.1-r2-s7 |
The following software releases have been updated to resolve this specific issue: 16.1R6-S2, 16.1R7, 16.2R2-S10, 17.1R3, 17.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.