CVE-2019-0001
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/01/2019
Last modified:
07/11/2023
Description
Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result in an extended denial of service condition for the device. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S1; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S1; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/106541
- https://kb.juniper.net/JSA10900
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMKFSHPMOZL7MDWU5RYOTIBTRWSZ4Z6X/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7CPKBW4QZ4VIY4UXIUVUSHRJ4R2FROE/



