Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-0003 : Security Advisory and Response

Discover how a crafted MPLS packet in Junos OS can lead to a kernel crash, causing a denial of service. Learn about affected versions and mitigation steps.

A crafted MPLS packet on a MPLS-configured interface in Junos OS can lead to a kernel crash.

Understanding CVE-2018-0003

Receiving or handling a specifically crafted MPLS packet on a MPLS-configured interface can lead to the storage of information in the system's memory. If this stored information is then accessed, it can potentially cause a kernel crash, resulting in a denial of service.

What is CVE-2018-0003?

        A specially crafted MPLS packet can cause a kernel crash in Junos OS.

The Impact of CVE-2018-0003

        Storing information in the system's memory from a crafted MPLS packet can lead to a denial of service due to a kernel crash.

Technical Details of CVE-2018-0003

A crafted MPLS packet can trigger a kernel crash in Junos OS.

Vulnerability Description

        Receiving or handling a specifically crafted MPLS packet on a MPLS-configured interface can lead to the storage of information in the system's memory, potentially causing a kernel crash.

Affected Systems and Versions

        Junos OS versions affected include 12.1X46-D71, 12.3R12-S7, 12.3X48-D55, 14.1R8-S5, 14.1R9, 14.1X53-D45, 14.1X53-D107, 14.2R7-S7, 14.2R8, 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1X49-D100, 15.1X53-D65, 15.1X53-D231, 16.1R3-S6, 16.1R4-S6, 16.1R5, 16.1X65-D45, 16.2R2-S1, 16.2R3, 17.1R2-S2, 17.1R3, 17.2R1-S3, 17.2R2, 17.2X75-D50.

Exploitation Mechanism

        A specially crafted MPLS packet triggers the vulnerability, potentially leading to a kernel crash.

Mitigation and Prevention

Steps to address and prevent the CVE-2018-0003 vulnerability.

Immediate Steps to Take

        Disallow MPLS packets from reaching the device.
        Remove MPLS configuration stanzas from at-risk interface configurations.
        No other viable workarounds exist for this issue.

Long-Term Security Practices

        Regularly update Junos OS to the patched versions.

Patching and Updates

        Update to the following software releases to resolve the issue: 12.1X46-D71, 12.3R12-S7, 12.3X48-D55, 14.1R8-S5, 14.1R9, 14.1X53-D45, 14.1X53-D107, 14.2R7-S7, 14.2R8, 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1X49-D100, 15.1X53-D65, 15.1X53-D231, 16.1R3-S6, 16.1R4-S6, 16.1R5, 16.1R3-S6, 16.1R4-S6, 16.1R5, 16.1X65-D45, 16.2R2-S1, 16.2R3, 17.1R2-S2, 17.1R3, 17.2R1-S3, 17.2R2, 17.2X75-D50, 17.3R1, and all subsequent releases.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now