On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. By continuously sending the offending packet, an attacker can repeatedly crash the FPC process causing a sustained Denial of Service (DoS). This issue affects both IPv4 and IPv6 packet processing. Affected releases are Juniper Networks Junos OS on QFX and PTX Series: 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R1-S3, 18.2R2; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D100.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2019-01-15T21:00:00Z
Updated: 2024-09-17T02:37:25.894Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0014
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-01-15T21:29:01.387
Modified: 2020-07-22T18:00:31.827
Link: CVE-2019-0014
Redhat
No data.