SB2023011168 - Time-of-check time-of-use (toctou) race condition in Junos OS Evolved



SB2023011168 - Time-of-check time-of-use (toctou) race condition in Junos OS Evolved

Published: January 11, 2023

Security Bulletin ID SB2023011168
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Adjecent network
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Time-of-check time-of-use (toctou) race condition (CVE-ID: CVE-2023-22397)

The vulnerability allows a remote non-authenticated attacker to a crash the entire system.

An Allocation of Resources Without Limits or Throttling weakness in the memory management of the Packet Forwarding Engine (PFE) on Juniper Networks Junos OS Evolved PTX10003 Series devices allows an adjacently located attacker who has established certain preconditions and knowledge of the environment to send certain specific genuine packets to begin a Time-of-check Time-of-use (TOCTOU) Race Condition attack which will cause a memory leak to begin. Once this condition begins, and as long as the attacker is able to sustain the offending traffic, a Distributed Denial of Service (DDoS) event occurs.


Remediation

Install update from vendor's website.