Lucene search

K
cvelistJuniperCVELIST:CVE-2017-10611
HistoryOct 13, 2017 - 5:00 p.m.

CVE-2017-10611 Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled

2017-10-1317:00:00
juniper
www.cve.org
3

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

46.3%

If extended statistics are enabled via ‘set chassis extended-statistics’, when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if ‘extended-statistics’ are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue.

CNA Affected

[
  {
    "platforms": [
      "MX Series"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "status": "affected",
        "version": "14.1 prior to 14.1R8-S5, 14.1R9"
      },
      {
        "status": "affected",
        "version": "14.2 prior to 14.2R7-S9, 14.2R8"
      },
      {
        "status": "affected",
        "version": "15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6"
      },
      {
        "status": "affected",
        "version": "16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6"
      },
      {
        "status": "affected",
        "version": "16.2 prior to 16.2R2-S1, 16.2R3"
      },
      {
        "status": "affected",
        "version": "17.1 prior to 17.1R2-S2, 17.1R3"
      },
      {
        "status": "affected",
        "version": "17.2 prior to 17.2R1-S3, 17.2R2"
      },
      {
        "status": "affected",
        "version": "17.2X75 prior to 17.2X75-D50"
      },
      {
        "status": "affected",
        "version": "17.3 prior to 17.3R1-S1, 17.3R2"
      }
    ]
  },
  {
    "platforms": [
      "EX2200, EX3300, XRE200"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "status": "affected",
        "version": "14.1X53 prior to 14.1X53-D46, 14.1X53-D50"
      },
      {
        "status": "affected",
        "version": "16.1X65 prior to 16.1X65-D45"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

46.3%

Related for CVELIST:CVE-2017-10611