7.5
CWE
400
Advisory Published
Updated

CVE-2023-22396: Junos OS: Receipt of crafted TCP packets destined to the device results in MBUF leak leading to a Denial of Service (DoS)

First published: Thu Jan 12 2023(Updated: )

An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to send crafted TCP packets destined to the device, resulting in an MBUF leak that ultimately leads to a Denial of Service (DoS). The system does not recover automatically and must be manually restarted to restore service. This issue occurs when crafted TCP packets are sent directly to a configured IPv4 or IPv6 interface on the device. Transit traffic will not trigger this issue. MBUF usage can be monitored through the use of the 'show system buffers' command. For example: user@junos> show system buffers | refresh 5 4054/566/4620 mbufs in use (current/cache/total) ... 4089/531/4620 mbufs in use (current/cache/total) ... 4151/589/4740 mbufs in use (current/cache/total) ... 4213/527/4740 mbufs in use (current/cache/total) This issue affects Juniper Networks Junos OS: 12.3 version 12.3R12-S19 and later versions; 15.1 version 15.1R7-S10 and later versions; 17.3 version 17.3R3-S12 and later versions; 18.4 version 18.4R3-S9 and later versions; 19.1 version 19.1R3-S7 and later versions; 19.2 version 19.2R3-S3 and later versions; 19.3 version 19.3R2-S7, 19.3R3-S3 and later versions prior to 19.3R3-S7; 19.4 version 19.4R2-S7, 19.4R3-S5 and later versions prior to 19.4R3-S10; 20.1 version 20.1R3-S1 and later versions; 20.2 version 20.2R3-S2 and later versions prior to 20.2R3-S6; 20.3 version 20.3R3-S1 and later versions prior to 20.3R3-S6; 20.4 version 20.4R2-S2, 20.4R3 and later versions prior to 20.4R3-S5; 21.1 version 21.1R2 and later versions prior to 21.1R3-S4; 21.2 version 21.2R1-S1, 21.2R2 and later versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2; 22.3 versions prior to 22.3R1-S1, 22.3R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper JUNOS=12.3-r12-s19
Juniper JUNOS=12.3-r12-s20
Juniper JUNOS=15.1-r7-s10
Juniper JUNOS=15.1-r7-s11
Juniper JUNOS=15.1-r7-s12
Juniper JUNOS=17.3-r3-s12
Juniper JUNOS=18.4-r3-s10
Juniper JUNOS=18.4-r3-s11
Juniper JUNOS=18.4-r3-s9
Juniper JUNOS=19.1-r3-s7
Juniper JUNOS=19.1-r3-s8
Juniper JUNOS=19.2-r3-s3
Juniper JUNOS=19.2-r3-s4
Juniper JUNOS=19.2-r3-s5
Juniper JUNOS=19.3-r2-s7
Juniper JUNOS=19.3-r3-s3
Juniper JUNOS=19.3-r3-s4
Juniper JUNOS=19.3-r3-s5
Juniper JUNOS=19.3-r3-s6
Juniper JUNOS=19.4
Juniper JUNOS=19.4-r2-s7
Juniper JUNOS=19.4-r3-s5
Juniper JUNOS=19.4-r3-s6
Juniper JUNOS=19.4-r3-s7
Juniper JUNOS=19.4-r3-s8
Juniper JUNOS=19.4-r3-s9
Juniper JUNOS=20.1-r3-s1
Juniper JUNOS=20.1-r3-s2
Juniper JUNOS=20.1-r3-s3
Juniper JUNOS=20.1-r3-s4
Juniper JUNOS=20.2-r3-s2
Juniper JUNOS=20.2-r3-s3
Juniper JUNOS=20.2-r3-s4
Juniper JUNOS=20.2-r3-s5
Juniper JUNOS=20.3-r3-s1
Juniper JUNOS=20.3-r3-s2
Juniper JUNOS=20.3-r3-s3
Juniper JUNOS=20.3-r3-s4
Juniper JUNOS=20.3-r3-s5
Juniper JUNOS=20.4-r2-s2
Juniper JUNOS=20.4-r3
Juniper JUNOS=20.4-r3-s1
Juniper JUNOS=20.4-r3-s2
Juniper JUNOS=20.4-r3-s3
Juniper JUNOS=20.4-r3-s4
Juniper JUNOS=20.4-r3-s5
Juniper JUNOS=21.1-r2
Juniper JUNOS=21.1-r2-s1
Juniper JUNOS=21.1-r2-s2
Juniper JUNOS=21.1-r3
Juniper JUNOS=21.1-r3-s1
Juniper JUNOS=21.1-r3-s2
Juniper JUNOS=21.1-r3-s3
Juniper JUNOS=21.2-r1-s1
Juniper JUNOS=21.2-r2
Juniper JUNOS=21.2-r2-s1
Juniper JUNOS=21.2-r2-s2
Juniper JUNOS=21.2-r3
Juniper JUNOS=21.2-r3-s1
Juniper JUNOS=21.2-r3-s2
Juniper JUNOS=21.3
Juniper JUNOS=21.3-r1
Juniper JUNOS=21.3-r1-s1
Juniper JUNOS=21.3-r1-s2
Juniper JUNOS=21.3-r2
Juniper JUNOS=21.3-r2-s1
Juniper JUNOS=21.3-r2-s2
Juniper JUNOS=21.3-r3
Juniper JUNOS=21.3-r3-s1
Juniper JUNOS=21.4
Juniper JUNOS=21.4-r1
Juniper JUNOS=21.4-r1-s1
Juniper JUNOS=21.4-r1-s2
Juniper JUNOS=21.4-r2
Juniper JUNOS=21.4-r2-s1
Juniper JUNOS=21.4-r2-s2
Juniper JUNOS=22.1-r1
Juniper JUNOS=22.1-r1-s1
Juniper JUNOS=22.1-r1-s2
Juniper JUNOS=22.1-r2
Juniper JUNOS=22.1-r3
Juniper JUNOS=22.2-r1
Juniper JUNOS=22.2-r1-s1
Juniper JUNOS=22.2-r2
Juniper JUNOS=22.3-r1
Juniper JUNOS=22.3-r2

Remedy

The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R3-S10, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S2, 21.4R3, 22.1R2-S1, 22.1R3, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1-S1, 22.3R2, 22.4R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203