A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D71; 12.3 versions before 12.3R12-S7; 12.3X48 versions before 12.3X48-D55; 14.1 versions before 14.1R8-S5, 14.1R9; 14.1X53 versions before 14.1X53-D45, 14.1X53-D107; 14.2 versions before 14.2R7-S7, 14.2R8; 15.1 versions before 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions before 15.1X49-D100; 15.1X53 versions before 15.1X53-D65, 15.1X53-D231; 16.1 versions before 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions before 16.1X65-D45; 16.2 versions before 16.2R2-S1, 16.2R3; 17.1 versions before 17.1R2-S2, 17.1R3; 17.2 versions before 17.2R1-S3, 17.2R2; 17.2X75 versions before 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 12.1x46 |
||
juniper junos 12.3x48 |
||
juniper junos 15.1x49 |
||
juniper junos 14.1x53 |
||
juniper junos 15.1x53 |
||
juniper junos 14.1 |
||
juniper junos 14.2 |
||
juniper junos 16.1 |
||
juniper junos 16.1x65 |
||
juniper junos 17.2x75 |
||
juniper junos 15.1 |
||
juniper junos 12.3 |
||
juniper junos 16.2 |
||
juniper junos 17.1 |
||
juniper junos 17.2 |