cvelist/2022/22xxx/CVE-2022-22226.json
2022-10-18 03:00:34 +00:00

211 lines
11 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2022-10-12T16:00:00.000Z",
"ID": "CVE-2022-22226",
"STATE": "PUBLIC",
"TITLE": "Junos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed cause a memory leak leading to a PFE crash"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS",
"version": {
"version_data": [
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": ">=",
"version_name": "17.1",
"version_value": "17.1R1"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": ">",
"version_name": "17.2",
"version_value": "17.2R1"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "17.3",
"version_value": "17.3R3-S12"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "17.4",
"version_value": "17.4R2-S13, 17.4R3-S5"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "18.1",
"version_value": "18.1R3-S13"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "18.2",
"version_value": "18.2R3-S8"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "18.3",
"version_value": "18.3R3-S5"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "18.4",
"version_value": "18.4R1-S8, 18.4R2-S6, 18.4R3-S6"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "19.1",
"version_value": "19.1R3-S4"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "19.2",
"version_value": "19.2R1-S7, 19.2R3-S1"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "19.3",
"version_value": "19.3R2-S6, 19.3R3-S1"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "19.4",
"version_value": "19.4R1-S4, 19.4R2-S4, 19.4R3-S1"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "20.1",
"version_value": "20.1R2"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "20.2",
"version_value": "20.2R2-S3, 20.2R3"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "<",
"version_name": "20.3",
"version_value": "20.3R2"
},
{
"platform": "EX4300-MP, EX4600, QFX5000 Series",
"version_affected": "!<",
"version_value": "17.1R1"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"configuration": [
{
"lang": "eng",
"value": "VxLANs must be in use. Refer to VXLAN documentation about VXLAN configurations.\n\n [vlans vlan-name vxlan \u2026]\n\nor\n\n [bridge-domains bridge-domain-name vxlan\u2026]\n "
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In VxLAN scenarios on EX4300-MP, EX4600, QFX5000 Series devices an Uncontrolled Memory Allocation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated adjacently located attacker sending specific packets to cause a Denial of Service (DoS) condition by crashing one or more PFE's when they are received and processed by the device. Upon automatic restart of the PFE, continued processing of these packets will cause the memory leak to reappear. Depending on the volume of packets received the attacker may be able to create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX4300-MP, EX4600, QFX5000 Series: 17.1 version 17.1R1 and later versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S7, 19.2R3-S1; 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Junos OS versions prior to 17.1R1."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-789 Uncontrolled Memory Allocation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA69876",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA69876"
},
{
"refsource": "MISC",
"url": "https://www.juniper.net/documentation/us/en/software/junos/ovsdb-vxlan/evpn-vxlan/topics/ref/statement/vxlan.html#id-vxlan__d281e31",
"name": "https://www.juniper.net/documentation/us/en/software/junos/ovsdb-vxlan/evpn-vxlan/topics/ref/statement/vxlan.html#id-vxlan__d281e31"
}
]
},
"solution": [
{
"lang": "eng",
"value": "The following software releases have been updated to resolve this specific issue: 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, and all subsequent releases.\n"
}
],
"source": {
"advisory": "JSA69876",
"defect": [
"1535518"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "eng",
"value": "There are no viable workarounds for this issue."
}
]
}