Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1653— Junos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak

CVSS 7.5 · High EPSS 0.46% · P64
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1653

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak
Source: NVD (National Vulnerability Database)
Vulnerability Description
On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may cause mbuf leak which can lead to Flexible PIC Concentrator (FPC) crash or the system to crash and restart (vmcore). This issue can be trigged by IPv4 or IPv6 and it is caused only by TCP packets. This issue is not related to any specific configuration and it affects Junos OS releases starting from 17.4R1. However, this issue does not affect Junos OS releases prior to 18.2R1 when Nonstop active routing (NSR) is configured [edit routing-options nonstop-routing]. The number of mbufs is platform dependent. The following command provides the number of mbufs counter that are currently in use and maximum number of mbufs that can be allocated on a platform: user@host> show system buffers 2437/3143/5580 mbufs in use (current/cache/total) Once the device runs out of mbufs, the FPC crashes or the vmcore occurs and the device might become inaccessible requiring a manual restart. This issue affects Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S5; 18.2X75 versions prior to 18.2X75-D41, 18.2X75-D420.12, 18.2X75-D51, 18.2X75-D60, 18.2X75-D34; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2. Versions of Junos OS prior to 17.4R1 are unaffected by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
特殊元素净化处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中存在安全漏洞。攻击者可通过发送TCP数据包到路由引擎(RE)利用该漏洞造成存储器缓存泄漏,导致Flex PIC集中器(FPC)崩溃或系统崩溃并重新启动(vmcore)。以下产品及版本受到影响:Juniper Networks Junos OS 17.4版本,
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS unspecified ~ 17.4R1 -

II. Public POCs for CVE-2020-1653

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1653

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-07-17 · 15 CVEs total

CVE-2020-16549.8 CRITICALJunos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is en
CVE-2020-16479.8 CRITICALJunos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution d
CVE-2020-16458.3 HIGHJunos OS: MX Series: Services card might restart when DNS filtering is enabled
CVE-2020-16497.5 HIGHJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reass
CVE-2020-16507.5 HIGHJunos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-M
CVE-2020-16487.5 HIGHJunos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
CVE-2020-16467.5 HIGHJunos OS and Junos OS Evolved: RPD crash while processing a specific BGP update informatio
CVE-2020-16447.5 HIGHJunos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets
CVE-2020-16407.5 HIGHJunos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash.
CVE-2020-16516.5 MEDIUMJunos OS: MX Series: PFE on the line card may crash due to memory leak.
CVE-2020-16416.5 MEDIUMJunos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and a
CVE-2020-16525.6 MEDIUMJunos Space: OpenNMS is accessible via port 9443
CVE-2020-16435.5 MEDIUMJunos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from
CVE-2020-16555.3 MEDIUMJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmen

IV. Related Vulnerabilities

V. Comments for CVE-2020-1653

No comments yet


Leave a comment