CVE-2020-1678
| Summary |
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task memory detail | match policy | match evpn" command multiple times to check if memory (Alloc Blocks value) is increasing. root@device> show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 3330678 79936272 3330678 79936272 root@device> show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 36620255 878886120 36620255 878886120 This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2; 20.1 versions prior to 20.1R1-S4, 20.1R2; Juniper Networks Junos OS Evolved: 19.4 versions; 20.1 versions prior to 20.1R1-S4-EVO, 20.1R2-EVO; 20.2 versions prior to 20.2R1-EVO; This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.
|
| Publication Date |
Oct. 17, 2020, 6:15 a.m. |
| Registration Date |
Jan. 26, 2021, 11:54 a.m. |
| Last Update |
Nov. 21, 2024, 2:11 p.m. |
|
CVSS3.1 : MEDIUM
|
| スコア |
6.5
|
| Vector |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) |
隣接 |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
不要 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
なし |
| 完全性への影響(I) |
なし |
| 可用性への影響(A) |
高 |
|
CVSS2.0 : LOW
|
| Score |
2.9
|
| Vector |
AV:A/AC:M/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) |
隣接 |
| 攻撃条件の複雑さ(AC) |
中 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
なし |
| 完全性への影響(I) |
なし |
| 可用性への影響(A) |
低 |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
いいえ
|
| User operation required |
いいえ
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:20.2:-:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:20.1:-:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:19.4:r2-s1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:juniper:junos_os_evolved:19.4:r2:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List
JVN Vulnerability Information
Juniper Networks Junos OS における有効なライフタイム後のリソースの解放の欠如に関する脆弱性
| Title |
Juniper Networks Junos OS における有効なライフタイム後のリソースの解放の欠如に関する脆弱性
|
| Summary |
Juniper Networks Junos OS には、有効なライフタイム後のリソースの解放の欠如に関する脆弱性が存在します。
|
| Possible impacts |
サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Oct. 14, 2020, midnight |
| Registration Date |
April 26, 2021, 4:28 p.m. |
| Last Update |
April 26, 2021, 4:28 p.m. |
Affected System
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2021年04月26日] 掲載 |
April 26, 2021, 4:28 p.m. |