Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2023-22410 | First vendor Publication | 2023-01-13 |
Vendor | Cve | Last vendor Modification | 2023-01-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 6.5 | ||
Base Score | 6.5 | Environmental Score | 6.5 |
impact SubScore | 3.6 | Temporal Score | 6.5 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Adjacent | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS on MX Series platforms with MPC10/MPC11 line cards, allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). Devices are only vulnerable when the Suspicious Control Flow Detection (scfd) feature is enabled. Upon enabling this specific feature, an attacker sending specific traffic is causing memory to be allocated dynamically and it is not freed. Memory is not freed even after deactivating this feature. Sustained processing of such traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. The FPC memory usage can be monitored using the CLI command "show chassis fpc". On running the above command, the memory of AftDdosScfdFlow can be observed to detect the memory leak. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 20.2R3-S5; 20.3 version 20.3R1 and later versions. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22410 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory Leak') |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
CONFIRM | https://kb.juniper.net/JSA70206 |
Alert History
Date | Informations |
---|---|
2023-09-05 13:38:19 |
|
2023-09-05 01:28:31 |
|
2023-09-02 13:36:11 |
|
2023-09-02 01:28:58 |
|
2023-08-12 13:42:04 |
|
2023-08-12 01:28:14 |
|
2023-08-11 13:33:08 |
|
2023-08-11 01:29:05 |
|
2023-08-06 13:30:32 |
|
2023-08-06 01:27:52 |
|
2023-08-04 13:31:02 |
|
2023-08-04 01:28:15 |
|
2023-07-28 02:19:32 |
|
2023-07-14 13:30:52 |
|
2023-07-14 01:27:53 |
|
2023-04-29 02:18:02 |
|
2023-04-28 02:17:05 |
|
2023-03-29 02:29:51 |
|
2023-03-28 12:27:43 |
|
2023-01-24 21:27:18 |
|
2023-01-20 21:27:17 |
|
2023-01-20 13:08:22 |
|
2023-01-13 09:27:16 |
|
2023-01-13 05:27:16 |
|