#VU52228 Memory leak in Juniper Junos OS - CVE-2021-0257

 

#VU52228 Memory leak in Juniper Junos OS - CVE-2021-0257

Published: April 15, 2021


Vulnerability identifier: #VU52228
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-0257
CWE-ID: CWE-401
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Juniper Junos OS
Software vendor:
Juniper Networks, Inc.

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak. On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart.


Remediation

Install updates from vendor's website.

This issue affects:

Juniper Networks Junos OS on MX Series, EX9200 Series

  • 17.3 versions prior to 17.3R3-S10;
  • 17.4 versions prior to 17.4R3-S3;
  • 18.2 versions prior to 18.2R3-S7;
  • 18.3 versions prior to 18.3R3-S4;
  • 18.4 versions prior to 18.4R3-S6;
  • 19.2 versions prior to 19.2R3-S2;
  • 19.3 versions prior to 19.3R3-S1;
  • 19.4 versions prior to 19.4R2-S2, 19.4R3;
  • 20.2 versions prior to 20.2R1-S3, 20.2R2;
  • 20.3 versions prior to 20.3R1-S1,, 20.3R2.

This issue does not affect Juniper Networks Junos OS:

  • 17.3 versions prior to 17.3R3-S8;
  • 17.4 versions prior to 17.4R3-S2;
  • any version of 18.1;
  • 18.2 versions prior to 18.2R3-S4;
  • 18.3 versions prior to 18.3R3-S2;
  • 18.4 versions prior to 18.4R3-S1;
  • any version of 19.1;
  • 19.2 versions prior to 19.2R2;
  • 19.3 versions prior to 19.3R3;
  • 19.4 versions prior to 19.4R2.

External links