ID

VAR-202004-0950


CVE

CVE-2020-1625


TITLE

Juniper Networks Junos OS Resource exhaustion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-003953

DESCRIPTION

The kernel memory usage represented as "temp" via 'show system virtual-memory' may constantly increase when Integrated Routing and Bridging (IRB) is configured with multiple underlay physical interfaces, and one interface flaps. This memory leak can affect running daemons (processes), leading to an extended Denial of Service (DoS) condition. Usage of "temp" virtual memory, shown here by a constantly increasing value of outstanding Requests, can be monitored by executing the 'show system virtual-memory' command as shown below: user@junos> show system virtual-memory |match "fpc|type|temp" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 10551 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6460 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 user@junos> show system virtual-memory |match "fpc|type|temp" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 16101 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6665 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 user@junos> show system virtual-memory |match "fpc|type|temp" fpc0: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2023 431K - 21867 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 fpc1: -------------------------------------------------------------------------- Type InUse MemUse HighUse Requests Size(s) temp 2020 431K - 6858 16,32,64,128,256,512,1024,2048,4096,65536,262144,1048576,2097152,4194304,8388608 This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D44; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60; 18.3 versions prior to 18.3R1-S5, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R2-S2, 18.4R3; 19.1 versions prior to 19.1R1-S3, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2. This issue does not affect Juniper Networks Junos OS 12.3 and 15.1. The operating system provides a secure programming interface and Junos SDK. A remote attacker could exploit this vulnerability with a specially crafted request to cause a denial of service. The following products and versions are affected: Juniper Networks Junos OS Release 16.1, Release 17.1, Release 17.2, Release 17.2X75, Release 17.3, Release 17.4, Release 18.1, Release 18.2, Release 18.2X75, Release 18.3, Release 18.4, Release 19.1, Release 19.2 Version

Trust: 1.71

sources: NVD: CVE-2020-1625 // JVNDB: JVNDB-2020-003953 // VULHUB: VHN-169309

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:16.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2x75

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.2x75

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-003953 // NVD: CVE-2020-1625

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-1625
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2020-1625
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-003953
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202004-522
value: MEDIUM

Trust: 0.6

VULHUB: VHN-169309
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-1625
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003953
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-169309
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-1625
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: JVNDB-2020-003953
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169309 // JVNDB: JVNDB-2020-003953 // CNNVD: CNNVD-202004-522 // NVD: CVE-2020-1625 // NVD: CVE-2020-1625

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

problemtype:CWE-401

Trust: 1.1

sources: VULHUB: VHN-169309 // JVNDB: JVNDB-2020-003953 // NVD: CVE-2020-1625

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202004-522

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202004-522

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003953

PATCH

title:JSA11004url:https://kb.juniper.net/JSA11004

Trust: 0.8

title:Juniper Networks Junos OS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115724

Trust: 0.6

sources: JVNDB: JVNDB-2020-003953 // CNNVD: CNNVD-202004-522

EXTERNAL IDS

db:NVDid:CVE-2020-1625

Trust: 2.5

db:JUNIPERid:JSA11004

Trust: 1.7

db:JVNDBid:JVNDB-2020-003953

Trust: 0.8

db:CNNVDid:CNNVD-202004-522

Trust: 0.7

db:AUSCERTid:ESB-2020.1271

Trust: 0.6

db:CNVDid:CNVD-2020-33643

Trust: 0.1

db:VULHUBid:VHN-169309

Trust: 0.1

sources: VULHUB: VHN-169309 // JVNDB: JVNDB-2020-003953 // CNNVD: CNNVD-202004-522 // NVD: CVE-2020-1625

REFERENCES

url:https://kb.juniper.net/jsa11004

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-1625

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1625

Trust: 0.8

url:https://kb.juniper.net/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1271/

Trust: 0.6

url:https://vigilance.fr/vulnerability/junos-os-memory-leak-via-interface-flaps-31969

Trust: 0.6

sources: VULHUB: VHN-169309 // JVNDB: JVNDB-2020-003953 // CNNVD: CNNVD-202004-522 // NVD: CVE-2020-1625

SOURCES

db:VULHUBid:VHN-169309
db:JVNDBid:JVNDB-2020-003953
db:CNNVDid:CNNVD-202004-522
db:NVDid:CVE-2020-1625

LAST UPDATE DATE

2024-08-14T12:28:34.905000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169309date:2021-09-14T00:00:00
db:JVNDBid:JVNDB-2020-003953date:2020-04-30T00:00:00
db:CNNVDid:CNNVD-202004-522date:2021-09-15T00:00:00
db:NVDid:CVE-2020-1625date:2021-09-14T13:39:23.033

SOURCES RELEASE DATE

db:VULHUBid:VHN-169309date:2020-04-08T00:00:00
db:JVNDBid:JVNDB-2020-003953date:2020-04-30T00:00:00
db:CNNVDid:CNNVD-202004-522date:2020-04-08T00:00:00
db:NVDid:CVE-2020-1625date:2020-04-08T20:15:13.917