"value":"A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution.\nAffected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are:\n14.1X53;\n15.1X53 versions prior to 15.1X53-D235;\n17.1 versions prior to 17.1R3;\n17.2 versions prior to 17.2R3;\n17.3 versions prior to 17.3R3-S2, 17.3R4;\n17.4 versions prior to 17.4R2-S1, 17.4R3;\n18.1 versions prior to 18.1R3-S1, 18.1R4;\n18.2 versions prior to 18.2R2;\n18.2X75 versions prior to 18.2X75-D30;\n18.3 versions prior to 18.3R2."
}
]
},
"exploit":[
{
"lang":"eng",
"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
"value":"The following software releases have been updated to resolve this specific issue: 15.1X53-D235, 17.1R3, 17.2R3, 17.3R3-S2, 17.3R4, 17.4R2-S1, 17.4R3, 18.1R3-S1, 18.1R4, 18.2R2, 18.2X75-D30, 18.3R2, 18.4R1, and all subsequent releases.\n"
}
],
"source":{
"advisory":"JSA10930",
"defect":[
"1371400"
],
"discovery":"USER"
},
"work_around":[
{
"lang":"eng",
"value":"There are no viable workarounds for this issue."