SB2023011168 - Time-of-check time-of-use (toctou) race condition in Junos OS Evolved
Published: January 11, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Time-of-check time-of-use (toctou) race condition (CVE-ID: CVE-2023-22397)
The vulnerability allows a remote non-authenticated attacker to a crash the entire system.
An Allocation of Resources Without Limits or Throttling weakness in the memory management of the Packet Forwarding Engine (PFE) on Juniper Networks Junos OS Evolved PTX10003 Series devices allows an adjacently located attacker who has established certain preconditions and knowledge of the environment to send certain specific genuine packets to begin a Time-of-check Time-of-use (TOCTOU) Race Condition attack which will cause a memory leak to begin. Once this condition begins, and as long as the attacker is able to sustain the offending traffic, a Distributed Denial of Service (DDoS) event occurs.
Remediation
Install update from vendor's website.