Memory leak in VPLS in Juniper Junos OS



Published: 2021-04-15
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-0257
CWE-ID CWE-401
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Juniper Junos OS
Operating systems & Components / Operating system

Vendor Juniper Networks, Inc.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Memory leak

EUVDB-ID: #VU52228

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-0257

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak. On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart.

Mitigation

Install updates from vendor's website.

This issue affects:

Juniper Networks Junos OS on MX Series, EX9200 Series

  • 17.3 versions prior to 17.3R3-S10;
  • 17.4 versions prior to 17.4R3-S3;
  • 18.2 versions prior to 18.2R3-S7;
  • 18.3 versions prior to 18.3R3-S4;
  • 18.4 versions prior to 18.4R3-S6;
  • 19.2 versions prior to 19.2R3-S2;
  • 19.3 versions prior to 19.3R3-S1;
  • 19.4 versions prior to 19.4R2-S2, 19.4R3;
  • 20.2 versions prior to 20.2R1-S3, 20.2R2;
  • 20.3 versions prior to 20.3R1-S1,, 20.3R2.

This issue does not affect Juniper Networks Junos OS:

  • 17.3 versions prior to 17.3R3-S8;
  • 17.4 versions prior to 17.4R3-S2;
  • any version of 18.1;
  • 18.2 versions prior to 18.2R3-S4;
  • 18.3 versions prior to 18.3R3-S2;
  • 18.4 versions prior to 18.4R3-S1;
  • any version of 19.1;
  • 19.2 versions prior to 19.2R2;
  • 19.3 versions prior to 19.3R3;
  • 19.4 versions prior to 19.4R2.

Vulnerable software versions

Juniper Junos OS: 17.3 - 20.4

External links

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11148&cat=SIRT_1&actp=LIST


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###