Vulnerability Name: CVE-2017-2312 (CCN-124555) Assigned: 2016-12-01 Published: 2017-04-13 Updated: 2019-10-03 Summary: On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process to crash and restart. It is not possible to free up the memory that has been consumed without restarting the rpd process. This issue affects Junos OS based devices with either IPv4 or IPv6 LDP enabled via the [protocols ldp] configuration (the native IPv6 support for LDP is available in Junos OS 16.1 and higher). The interface on which the packet arrives needs to have LDP enabled. The affected Junos versions are: 13.3 prior to 13.3R10; 14.1 prior to 14.1R8; 14.2 prior to 14.2R7-S6 or 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5; 15.1X49 before 15.1X49-D70; 15.1X53 before 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 before 16.1R2. 16.2R1 and all subsequent releases have a resolution for this vulnerability. CVSS v3 Severity: 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-772 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2017-2312 Source: CCN Type: SECTRACK ID: 1038252Juniper Junos LDP Packet Processing Memory Leak Lets Remote Users Cause the Target rpd Service to Crash Source: BID Type: Third Party Advisory, VDB Entry97611 Source: CCN Type: BID-97611Juniper Junos CVE-2017-2312 Denial of Service Vulnerability Source: SECTRACK Type: UNKNOWN1038252 Source: XF Type: UNKNOWNjuniper-cve20172312-dos(124555) Source: CCN Type: Juniper Networks Security Bulletin JSA10777Junos: Crafted LDP packets cause a memory leak that could lead to rpd crash (CVE-2017-2312) Source: CONFIRM Type: Mitigation, Vendor Advisoryhttps://kb.juniper.net/JSA10777 Vulnerable Configuration: Configuration 1 :cpe:/o:juniper:junos:13.3:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r1:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r2:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r3:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r4:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r5:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r6:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r7:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r8:*:*:*:*:*:* OR cpe:/o:juniper:junos:13.3:r9:*:*:*:*:*:* Configuration 2 :cpe:/o:juniper:junos:14.1:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r1:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r2:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r3:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r4:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r5:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r6:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1:r7:*:*:*:*:*:* Configuration 3 :cpe:/o:juniper:junos:14.2:r1:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.2:r2:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.2:r3:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.2:r4:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.2:r5:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.2:r6:*:*:*:*:*:* Configuration 4 :cpe:/o:juniper:junos:15.1:f2:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s1:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s2:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s3:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s4:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f3:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f4:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f5:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f6:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r1:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r2:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r3:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r4:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d20:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d35:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d40:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d45:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d50:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d60:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d65:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d20:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d21:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d210:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d32:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d33:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d34:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d60:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d61:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d62:*:*:*:*:*:* Configuration 5 :cpe:/o:juniper:junos:16.1:r1:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:juniper:junos:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
juniper junos 13.3
juniper junos 13.3 r1
juniper junos 13.3 r2
juniper junos 13.3 r3
juniper junos 13.3 r4
juniper junos 13.3 r5
juniper junos 13.3 r6
juniper junos 13.3 r7
juniper junos 13.3 r8
juniper junos 13.3 r9
juniper junos 14.1
juniper junos 14.1 r1
juniper junos 14.1 r2
juniper junos 14.1 r3
juniper junos 14.1 r4
juniper junos 14.1 r5
juniper junos 14.1 r6
juniper junos 14.1 r7
juniper junos 14.2 r1
juniper junos 14.2 r2
juniper junos 14.2 r3
juniper junos 14.2 r4
juniper junos 14.2 r5
juniper junos 14.2 r6
juniper junos 15.1 f2
juniper junos 15.1 f2-s1
juniper junos 15.1 f2-s2
juniper junos 15.1 f2-s3
juniper junos 15.1 f2-s4
juniper junos 15.1 f3
juniper junos 15.1 f4
juniper junos 15.1 f5
juniper junos 15.1 f6
juniper junos 15.1 r1
juniper junos 15.1 r2
juniper junos 15.1 r3
juniper junos 15.1 r4
juniper junos 15.1x49 d10
juniper junos 15.1x49 d20
juniper junos 15.1x49 d30
juniper junos 15.1x49 d35
juniper junos 15.1x49 d40
juniper junos 15.1x49 d45
juniper junos 15.1x49 d50
juniper junos 15.1x49 d60
juniper junos 15.1x49 d65
juniper junos 15.1x53 d10
juniper junos 15.1x53 d20
juniper junos 15.1x53 d21
juniper junos 15.1x53 d210
juniper junos 15.1x53 d30
juniper junos 15.1x53 d32
juniper junos 15.1x53 d33
juniper junos 15.1x53 d34
juniper junos 15.1x53 d60
juniper junos 15.1x53 d61
juniper junos 15.1x53 d62
juniper junos 16.1 r1
juniper junos -