Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-22399

Опубликовано: 13 янв. 2023
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00468
Низкий

7.5 High

CVSS3

Дефекты

CWE-120
CWE-120

Связанные уязвимости

CVSS3: 7.5
github
около 3 лет назад

When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versi...

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость компонента dcpfe операционных систем Juniper Networks Junos, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 64%
0.00468
Низкий

7.5 High

CVSS3

Дефекты

CWE-120
CWE-120