Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-0013 : Security Advisory and Response

Learn about CVE-2019-0013, a vulnerability in Juniper Networks Junos OS that could lead to a Denial of Service (DoS) condition. Find out the impacted versions and mitigation steps.

A vulnerability in Juniper Networks Junos OS could allow an attacker to cause a Denial of Service (DoS) condition by sending a specific invalid IPv4 PIM Join packet.

Understanding CVE-2019-0013

This CVE involves a vulnerability in Juniper Networks Junos OS that can lead to a crash and restart of the routing protocol daemon (RPD) upon receiving a malformed PIM packet.

What is CVE-2019-0013?

When an invalid IPv4 PIM Join packet is received, the RPD process crashes and restarts, potentially causing a DoS condition. This vulnerability affects specific versions of Junos OS.

The Impact of CVE-2019-0013

        CVSS Base Score: 6.5 (Medium Severity)
        Attack Vector: Adjacent Network
        Availability Impact: High
        Attack Complexity: Low
        No known malicious exploitation

Technical Details of CVE-2019-0013

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The RPD process crashes and restarts when receiving an invalid IPv4 PIM Join packet, potentially leading to a DoS condition.

Affected Systems and Versions

The following Junos OS versions are affected:

        12.1X46 versions prior to 12.1X46-D77
        12.3X48 versions prior to 12.3X48-D77
        15.1 versions prior to 15.1F6-S10, 15.1R6-S6, 15.1R7
        15.1X49 versions prior to 15.1X49-D150
        15.1X53 versions prior to 15.1X53-D233, 15.1X53-D59
        16.1 versions prior to 16.1R3-S8, 16.1R4-S8, 16.1R7
        16.2 versions prior to 16.2R2-S6
        17.1 versions prior to 17.1R2-S6, 17.1R3
        17.2 versions prior to 17.2R2-S3, 17.2R3
        17.3 versions prior to 17.3R2-S4, 17.3R3
        17.4 versions prior to 17.4R2

Exploitation Mechanism

The vulnerability is triggered by the reception of an invalid IPv4 PIM Join packet, causing the RPD process to crash and restart.

Mitigation and Prevention

To address CVE-2019-0013, follow these mitigation steps:

Immediate Steps to Take

        Apply the provided software updates for Junos OS versions mentioned in the solution section.

Long-Term Security Practices

        Regularly update Junos OS to the latest releases to prevent known vulnerabilities.

Patching and Updates

        Install the recommended software releases to resolve the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now