SB2023011173 - Buffer overflow in Juniper Junos OS



SB2023011173 - Buffer overflow in Juniper Junos OS

Published: January 11, 2023

Security Bulletin ID SB2023011173
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Buffer overflow (CVE-ID: CVE-2023-22399)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition.

 The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process.


Remediation

Install update from vendor's website.