CVE-2019-0001 — Uncontrolled Recursion in Networks Junos OS
Severity
7.5HIGHNVD
EPSS
0.6%
top 29.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 15
Latest updateMay 13
Description
Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result in an extended denial of service condition for the device. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S1; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 1…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
Also affects: Fedora 30, 31
🔴Vulnerability Details
1GHSA▶
GHSA-ww3g-x39p-r2pw: Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge su↗2022-05-13
💥Exploits & PoCs
1📋Vendor Advisories
2VMware▶
VMware product updates resolve mishandled file descriptor vulnerability in runc container runtime.↗2019-02-15
Juniper▶
CVE-2019-0001: Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge su↗2019-01-15
📄Research Papers
1💬Community
10Bugzilla▶
CVE-2019-8835 webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution↗2020-03-24
Bugzilla▶
CVE-2019-8844 webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution↗2020-03-24
Bugzilla▶
CVE-2019-18801 envoy: an untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1↗2019-11-18