CVE-2019-0014
Summary
| CVE | CVE-2019-0014 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-01-15 21:29:00 UTC |
| Updated | 2020-07-22 18:00:00 UTC |
| Description | On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. By continuously sending the offending packet, an attacker can repeatedly crash the FPC process causing a sustained Denial of Service (DoS). This issue affects both IPv4 and IPv6 packet processing. Affected releases are Juniper Networks Junos OS on QFX and PTX Series: 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R1-S3, 18.2R2; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D100. |
Risk And Classification
Problem Types: CWE-19
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos | 17.2x75 | d102 | All | All |
| Operating System | Juniper | Junos | 17.2x75 | d50 | All | All |
| Operating System | Juniper | Junos | 17.2x75 | d70 | All | All |
| Operating System | Juniper | Junos | 17.4 | All | All | All |
| Operating System | Juniper | Junos | 17.4 | r1 | All | All |
| Operating System | Juniper | Junos | 17.4 | r2 | All | All |
| Operating System | Juniper | Junos | 18.2 | r1 | All | All |
| Operating System | Juniper | Junos | 17.2x75 | d102 | All | All |
| Operating System | Juniper | Junos | 17.2x75 | d50 | All | All |
| Operating System | Juniper | Junos | 17.2x75 | d70 | All | All |
| Operating System | Juniper | Junos | 17.4 | All | All | All |
| Operating System | Juniper | Junos | 17.4 | r1 | All | All |
| Operating System | Juniper | Junos | 17.4 | r2 | All | All |
| Operating System | Juniper | Junos | 18.2 | r1 | All | All |
| Hardware | Juniper | Ptx1000 | - | All | All | All |
| Hardware | Juniper | Ptx1000 | - | All | All | All |
| Hardware | Juniper | Ptx10002 | - | All | All | All |
| Hardware | Juniper | Ptx10002 | - | All | All | All |
| Hardware | Juniper | Ptx10008 | - | All | All | All |
| Hardware | Juniper | Ptx10008 | - | All | All | All |
| Hardware | Juniper | Ptx10016 | - | All | All | All |
| Hardware | Juniper | Ptx10016 | - | All | All | All |
| Hardware | Juniper | Ptx3000 | - | All | All | All |
| Hardware | Juniper | Ptx3000 | - | All | All | All |
| Hardware | Juniper | Ptx5000 | - | All | All | All |
| Hardware | Juniper | Ptx5000 | - | All | All | All |
| Hardware | Juniper | Qfx10002 | - | All | All | All |
| Hardware | Juniper | Qfx10002 | - | All | All | All |
| Hardware | Juniper | Qfx10008 | - | All | All | All |
| Hardware | Juniper | Qfx10008 | - | All | All | All |
| Hardware | Juniper | Qfx10016 | - | All | All | All |
| Hardware | Juniper | Qfx10016 | - | All | All | All |
| Hardware | Juniper | Qfx3500 | - | All | All | All |
| Hardware | Juniper | Qfx3500 | - | All | All | All |
| Hardware | Juniper | Qfx3600 | - | All | All | All |
| Hardware | Juniper | Qfx3600 | - | All | All | All |
| Hardware | Juniper | Qfx5100 | - | All | All | All |
| Hardware | Juniper | Qfx5100 | - | All | All | All |
| Hardware | Juniper | Qfx5110 | - | All | All | All |
| Hardware | Juniper | Qfx5110 | - | All | All | All |
| Hardware | Juniper | Qfx5120 | - | All | All | All |
| Hardware | Juniper | Qfx5120 | - | All | All | All |
| Hardware | Juniper | Qfx5200 | - | All | All | All |
| Hardware | Juniper | Qfx5200 | - | All | All | All |
| Hardware | Juniper | Qfx5210 | - | All | All | All |
| Hardware | Juniper | Qfx5210 | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Juniper Junos CVE-2019-0014 Remote Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| 2019-01 Security Bulletin: Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packet (CVE-2019-0014) - Juniper Networks | CONFIRM | kb.juniper.net | Mitigation, Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.