ID

VAR-201901-1606


CVE

CVE-2019-0010


TITLE

Junos OS Resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-001713

DESCRIPTION

An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which can be identified through the following log messages: all_logs.0:Jun 8 03:25:03 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 50%. all_logs.0:Jun 8 03:25:13 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 51%. all_logs.0:Jun 8 03:25:24 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 52%. Eventually the system runs out of mbufs and the system crashes (fails over) with the error "mbuf exceed". This issue only occurs when HTTP AV inspection is configured. Devices configured for Web Filtering alone are unaffected by this issue. Affected releases are Junos OS on SRX Series: 12.1X46 versions prior to 12.1X46-D81; 12.3X48 versions prior to 12.3X48-D77; 15.1X49 versions prior to 15.1X49-D101, 15.1X49-D110. Junos OS Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a denial-of-service vulnerability. An attacker may exploit this issue to cause denial-of-service conditions. Juniper SRX Series is an SRX series firewall device of Juniper Networks (Juniper Networks). Junos OS is a set of operating systems running on it. A security vulnerability exists in Junos OS Release 12.1X46, Release 12.3X48, and Release 15.1X49 on the Juniper SRX Series. Attackers can use specially crafted HTTP traffic to exploit this vulnerability to cause a denial of service (system crash)

Trust: 1.98

sources: NVD: CVE-2019-0010 // JVNDB: JVNDB-2019-001713 // BID: 106535 // VULHUB: VHN-140041

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.3

vendor:junipermodel:junos osscope:eqversion:12.1x46-d81

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x49-d101

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x46

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.3x48

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1x49

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x49-d110

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3x48-d77

Trust: 0.8

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d75scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d70scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d66scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d60scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d55scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d51scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d77scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d76scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d72scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d71scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d67scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d66scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d65scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d60scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d55scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d51scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d46scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d37scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d110scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d101scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d77scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d81scope:neversion: -

Trust: 0.3

sources: BID: 106535 // JVNDB: JVNDB-2019-001713 // NVD: CVE-2019-0010

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0010
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2019-0010
value: HIGH

Trust: 1.0

NVD: CVE-2019-0010
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-370
value: HIGH

Trust: 0.6

VULHUB: VHN-140041
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-0010
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-140041
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-0010
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-140041 // JVNDB: JVNDB-2019-001713 // CNNVD: CNNVD-201901-370 // NVD: CVE-2019-0010 // NVD: CVE-2019-0010

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-140041 // JVNDB: JVNDB-2019-001713 // NVD: CVE-2019-0010

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-370

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201901-370

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001713

PATCH

title:JSA10910url:https://kb.juniper.net/JSA10910

Trust: 0.8

title:Juniper SRX Series Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88529

Trust: 0.6

sources: JVNDB: JVNDB-2019-001713 // CNNVD: CNNVD-201901-370

EXTERNAL IDS

db:NVDid:CVE-2019-0010

Trust: 2.8

db:BIDid:106535

Trust: 2.0

db:JUNIPERid:JSA10910

Trust: 2.0

db:JVNDBid:JVNDB-2019-001713

Trust: 0.8

db:CNNVDid:CNNVD-201901-370

Trust: 0.7

db:VULHUBid:VHN-140041

Trust: 0.1

sources: VULHUB: VHN-140041 // BID: 106535 // JVNDB: JVNDB-2019-001713 // CNNVD: CNNVD-201901-370 // NVD: CVE-2019-0010

REFERENCES

url:http://www.securityfocus.com/bid/106535

Trust: 2.3

url:https://kb.juniper.net/jsa10910

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0010

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0010

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://www.juniper.net/us/en/products-services/nos/junos/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10910

Trust: 0.3

sources: VULHUB: VHN-140041 // BID: 106535 // JVNDB: JVNDB-2019-001713 // CNNVD: CNNVD-201901-370 // NVD: CVE-2019-0010

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 106535

SOURCES

db:VULHUBid:VHN-140041
db:BIDid:106535
db:JVNDBid:JVNDB-2019-001713
db:CNNVDid:CNNVD-201901-370
db:NVDid:CVE-2019-0010

LAST UPDATE DATE

2024-11-23T23:01:53.391000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-140041date:2020-08-24T00:00:00
db:BIDid:106535date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2019-001713date:2019-03-25T00:00:00
db:CNNVDid:CNNVD-201901-370date:2020-08-25T00:00:00
db:NVDid:CVE-2019-0010date:2024-11-21T04:16:02.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-140041date:2019-01-15T00:00:00
db:BIDid:106535date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2019-001713date:2019-03-25T00:00:00
db:CNNVDid:CNNVD-201901-370date:2019-01-11T00:00:00
db:NVDid:CVE-2019-0010date:2019-01-15T21:29:01.197