mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
178 lines
7.9 KiB
JSON
178 lines
7.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "sirt@juniper.net",
|
|
"DATE_PUBLIC": "2023-04-12T16:00:00.000Z",
|
|
"ID": "CVE-2023-28976",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Junos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Junos OS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_value": "19.1R3-S10"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "19.2",
|
|
"version_value": "19.2R3-S7"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "19.3",
|
|
"version_value": "19.3R3-S8"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "19.4",
|
|
"version_value": "19.4R3-S11"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "20.2",
|
|
"version_value": "20.2R3-S5"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "20.4",
|
|
"version_value": "20.4R3-S6"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "21.1",
|
|
"version_value": "21.1R3-S5"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "21.2",
|
|
"version_value": "21.2R3-S4"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "21.3",
|
|
"version_value": "21.3R3"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "21.4",
|
|
"version_value": "21.4R3"
|
|
},
|
|
{
|
|
"platform": "MX Series",
|
|
"version_affected": "<",
|
|
"version_name": "22.1",
|
|
"version_value": "22.1R2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Juniper Networks"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2."
|
|
}
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
|
|
}
|
|
],
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-754 Improper Check for Unusual or Exceptional Conditions"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Denial of Service (DoS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://supportportal.juniper.net/JSA70601",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://supportportal.juniper.net/JSA70601"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S5, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases."
|
|
}
|
|
],
|
|
"source": {
|
|
"advisory": "JSA70601",
|
|
"defect": [
|
|
"1647532"
|
|
],
|
|
"discovery": "USER"
|
|
},
|
|
"work_around": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "There are no known workarounds for this issue."
|
|
}
|
|
]
|
|
} |