When an E-series router running an affected release of JUNOSe receives a non-RFC1112 compliant multicast packet on the SRP Ethernet port, there is a possibility that the SRP may reset. The SRP Ethernet interface does not support multicast and discards all RFC1112-compliant packets. However, when a non-compliant packet is received, the packet is discarded and the buffer is freed. The problem occurs when the freed pointer to the buffer is incorrectly still sent to the underlying operating system for processing, resulting in the SRP panic in netBufLib.c.
This issue was found initially during System Test, although several cases have subsequently been reported in the field. All reported cases of this issue were determined to be triggered by a misconfigured device with a source MAC address in the reserved multicast MAC address range. The response to the source multicast MAC address from another device on the network, which would then have a valid multicast destination MAC address, did not have an RFC1112-compliant payload. This response packet triggered the reset.
There are no confirmed reports of this issue being triggered by a deliberate attack on the router from an external source.
This issue is tracked internally as
CQ 81842.
This impact of this vulnerability is minimized by the fact that the issue only occurs when packets reach the management Ethernet port, which should be secured through standard security best common practices (BCPs). Additionally, the result of the SRP reset should only be a momentary interruption of service if redundant SRPs are deployed, and virtually no interruption of service of High Availability (HA) is enabled.