Knowledge Search


×
 

2019-01 Security Bulletin: Junos OS: A flowspec BGP update with a specific term-order causes routing protocol daemon (rpd) process to crash with a core. (CVE-2019-0003)

  [JSA10902] Show Article Properties


Product Affected:
This issue affects Junos OS 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53.
Problem:

When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated.

Affected releases are Juniper Networks Junos OS:

  • 12.1X46 versions prior to 12.1X46-D77 on SRX Series;
  • 12.3 versions prior to 12.3R12-S10;
  • 12.3X48 versions prior to 12.3X48-D70 on SRX Series;
  • 14.1X53 versions prior to 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100;
  • 15.1 versions prior to 15.1R3;
  • 15.1F versions prior to 15.1F3;
  • 15.1X49 versions prior to 15.1X49-D140 on SRX Series;
  • 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400.

The following maximal parent* configuration is required:

set protocols bgp group [FLOWSPEC]

and

set policy-options policy-statement
set routing-options flow term-order

Specific child* relationship configuration details vary by implementation which may introduce this vulnerability.

*"parent" and "child" as in a parent-child tree structure relationship within the CLI.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2019-0003.

Solution:

The following software releases have been updated to resolve this specific issue: 12.1X46-D77, 12.3R12-S10, 12.3X48-D70, 14.1X53-D47, 15.1F3, 15.1R3, 15.1X49-D140, 15.1X53-D59, 16.1R1 and all subsequent releases.

This issue is being tracked as PR 1116761 which is visible on the Customer Support website.

Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL).

Workaround:

Disable BGP flowspec.

There are no other available workarounds for this issue.

Implementation:
Software Releases, patches and updates are available at https://www.juniper.net/support/downloads/.
Modification History:
2019-01-09: Initial Publication.
Related Links:
CVSS Score:
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."