Input validation error in Juniper Junos OS - CVE-2019-0067
Published: October 14, 2019
Juniper Junos OS
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when receipt of a specific link-local IPv6 packet destined to the RE. A remote attacker on adjacent network can send a specially crafted IPv6 packet, repeatedly crash the system and restart (vmcore) and cause a prolonged denial of service condition on the target system.
Note: This issue affects Junos OS devices with Multi-Chassis Link Aggregation Group (MC-LAG) enabled.