Vulnerability Name:

CVE-2019-0038 (CCN-159359)

Assigned:2018-10-11
Published:2019-04-10
Updated:2021-10-25
Summary:Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No other products or platforms are affected by this vulnerability. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D160 on SRX340/SRX345; 17.3 on SRX340/SRX345; 17.4 versions prior to 17.4R2-S3, 17.4R3 on SRX340/SRX345; 18.1 versions prior to 18.1R3-S1 on SRX340/SRX345; 18.2 versions prior to 18.2R2 on SRX340/SRX345; 18.3 versions prior to 18.3R1-S2, 18.3R2 on SRX340/SRX345. This issue does not affect Junos OS releases prior to 15.1X49 on any platform.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.1 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-770
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-0038

Source: BID
Type: Third Party Advisory, VDB Entry
107873

Source: XF
Type: UNKNOWN
juniper-cve20190038-dos(159359)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10927
SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS (CVE-2019-0038)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10927

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.3:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d10:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d50:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d60:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d20:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d30:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d35:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d40:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.2:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d65:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d70:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d75:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d80:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d150:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d45:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d55:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:srx340:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx345:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:17.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.1:-:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 17.4 -
    juniper junos 18.1 r2-s2
    juniper junos 18.2 -
    juniper junos 18.3 r2
    juniper junos 15.1x49 d10
    juniper junos 15.1x49 d50
    juniper junos 15.1x49 d60
    juniper junos 17.4 r2-s1
    juniper junos 17.4 r2-s2
    juniper junos 18.1 -
    juniper junos 18.1 r1
    juniper junos 18.1 r2
    juniper junos 15.1x49 d20
    juniper junos 15.1x49 d30
    juniper junos 15.1x49 d35
    juniper junos 15.1x49 d40
    juniper junos 18.2 r1
    juniper junos 18.3 r1-s1
    juniper junos 18.3 r1
    juniper junos 18.3 -
    juniper junos 15.1x49 d65
    juniper junos 15.1x49 d70
    juniper junos 15.1x49 d75
    juniper junos 15.1x49 d80
    juniper junos 17.3 -
    juniper junos 18.1 r2-s1
    juniper junos 18.1 r3
    juniper junos 15.1x49 -
    juniper junos 15.1x49 d150
    juniper junos 15.1x49 d45
    juniper junos 15.1x49 d55
    juniper srx340 -
    juniper srx345 -
    juniper junos 17.3 -
    juniper junos 15.1x49
    juniper junos 18.1 -
    juniper junos 18.2
    juniper junos 17.4 -