cvelist/2023/22xxx/CVE-2023-22399.json

183 lines
8.5 KiB
JSON
Raw Normal View History

2022-12-27 17:00:43 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2023-01-11T17:00:00.000Z",
2022-12-27 17:00:43 +00:00
"ID": "CVE-2023-22399",
"STATE": "PUBLIC",
"TITLE": "Junos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled"
2022-12-27 17:00:43 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS",
"version": {
"version_data": [
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_value": "19.4R3-S9"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "20.2",
"version_value": "20.2R3-S6"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "20.3",
"version_value": "20.3R3-S6"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "20.4",
"version_value": "20.4R3-S5"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "21.1",
"version_value": "21.1R3-S4"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "21.2",
"version_value": "21.2R3-S3"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "21.3",
"version_value": "21.3R3-S2"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "21.4",
"version_value": "21.4R2-S2, 21.4R3"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "22.1",
"version_value": "22.1R2"
},
{
"platform": "QFX10K Series",
"version_affected": "<",
"version_name": "22.2",
"version_value": "22.2R1-S2, 22.2R2"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"configuration": [
{
"lang": "eng",
"value": "This issue only affects systems with sFlow enabled. An example sFlow configuration is shown below:\n\n [protocols sflow collector <ip-address> udp-port <port-number>]\n [protocols sflow interfaces <interface-name> polling-interval <seconds> sample-rate <number>]\n"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-12-27 17:00:43 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-01-13 00:00:40 +00:00
"value": "When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R1-S2, 22.2R2."
2022-12-27 17:00:43 +00:00
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120 Buffer Overflow"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (DoS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA70195",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA70195"
},
{
"name": "https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/sflow-monitoring-technology.html",
"refsource": "MISC",
"url": "https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/sflow-monitoring-technology.html"
}
]
},
"solution": [
{
"lang": "eng",
"value": "The following software releases have been updated to resolve this specific issue: 19.4R3-S9, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R2, 22.2R1-S2, 22.2R2, 22.3R1, and all subsequent releases.\n"
}
],
"source": {
"advisory": "JSA70195",
"defect": [
"1668330"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "eng",
"value": "1. Prevent sflow from monitoring ECMP forwarded packets.\n\n2. Temporarily disable sFlow to mitigate this issue.\n"
}
]
2022-12-27 17:00:43 +00:00
}