Juniper Junos MX Malformed Packet - DOS (JSA10900)

High Nessus Plugin ID 121642


The remote device is missing a vendor-supplied security patch.


Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result in an extended denial of service condition for the device.


Apply the relevant Junos software release referenced in Juniper advisory JSA10900.

See Also

Plugin Details

Severity: High

ID: 121642

File Name: juniper_jsa10900.nasl

Version: 1.2

Type: combined

Published: 2019/02/07

Updated: 2019/03/27

Dependencies: 55932

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-0001

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version, Host/Juniper/model

Patch Publication Date: 2019/01/09

Vulnerability Publication Date: 2019/01/09

Reference Information

CVE: CVE-2019-0001

BID: 106541

JSA: JSA10900