Juniper Junos MX Malformed Packet - DOS (JSA10900)

High Nessus Plugin ID 121642

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result in an extended denial of service condition for the device.

Solution

Apply the relevant Junos software release referenced in Juniper advisory JSA10900.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10900

Plugin Details

Severity: High

ID: 121642

File Name: juniper_jsa10900.nasl

Version: 1.2

Type: combined

Published: 2019/02/07

Updated: 2019/03/27

Dependencies: 55932

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-0001

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/o:juniper:junos

Patch Publication Date: 2019/01/09

Vulnerability Publication Date: 2019/01/09

Reference Information

CVE: CVE-2019-0001

BID: 106541

JSA: JSA10900