SB2023101766 - Denial of service in Junos OS when handling TCP traffic



SB2023101766 - Denial of service in Junos OS when handling TCP traffic

Published: October 17, 2023

Security Bulletin ID SB2023101766
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2023-36841)

The vulnerability allows a unauthenticated network-based attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause an infinite loop, resulting in a Denial of Service (DoS). An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE.


Remediation

Install update from vendor's website.