ID

VAR-201704-0733


CVE

CVE-2017-2312


TITLE

Juniper Networks Works with device products Junos OS Resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-003624

DESCRIPTION

On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process to crash and restart. It is not possible to free up the memory that has been consumed without restarting the rpd process. This issue affects Junos OS based devices with either IPv4 or IPv6 LDP enabled via the [protocols ldp] configuration (the native IPv6 support for LDP is available in Junos OS 16.1 and higher). The interface on which the packet arrives needs to have LDP enabled. The affected Junos versions are: 13.3 prior to 13.3R10; 14.1 prior to 14.1R8; 14.2 prior to 14.2R7-S6 or 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5; 15.1X49 before 15.1X49-D70; 15.1X53 before 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 before 16.1R2. 16.2R1 and all subsequent releases have a resolution for this vulnerability. Juniper Networks Works with device products Junos OS Contains a resource management vulnerability.Service operation interruption (DoS) An attack may be carried out. Juniper Junos is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash and restart the affected device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK

Trust: 1.98

sources: NVD: CVE-2017-2312 // JVNDB: JVNDB-2017-003624 // BID: 97611 // VULHUB: VHN-110515

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1x53

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:16.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.2

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

vendor:junipermodel:junos 16.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d60scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d60scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f4-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2-s5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6-s1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4-s7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3-s9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r7-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4.6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r3-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1.8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1.7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 16.2r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 16.1r2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d70scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d63scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d230scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d70scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r5scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r4-s7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f6-s4scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f5-s7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2-s14scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r7-s6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d44scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.3r10scope:neversion: -

Trust: 0.3

sources: BID: 97611 // JVNDB: JVNDB-2017-003624 // CNNVD: CNNVD-201704-986 // NVD: CVE-2017-2312

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2312
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-2312
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201704-986
value: MEDIUM

Trust: 0.6

VULHUB: VHN-110515
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2312
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-110515
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2312
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110515 // JVNDB: JVNDB-2017-003624 // CNNVD: CNNVD-201704-986 // NVD: CVE-2017-2312

PROBLEMTYPE DATA

problemtype:CWE-772

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-110515 // JVNDB: JVNDB-2017-003624 // NVD: CVE-2017-2312

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201704-986

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201704-986

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003624

PATCH

title:JSA10777url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10777&actp=METADATA

Trust: 0.8

title:Juniper Networks Junos OS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70253

Trust: 0.6

sources: JVNDB: JVNDB-2017-003624 // CNNVD: CNNVD-201704-986

EXTERNAL IDS

db:NVDid:CVE-2017-2312

Trust: 2.8

db:BIDid:97611

Trust: 2.0

db:JUNIPERid:JSA10777

Trust: 2.0

db:SECTRACKid:1038252

Trust: 1.7

db:JVNDBid:JVNDB-2017-003624

Trust: 0.8

db:CNNVDid:CNNVD-201704-986

Trust: 0.7

db:VULHUBid:VHN-110515

Trust: 0.1

sources: VULHUB: VHN-110515 // BID: 97611 // JVNDB: JVNDB-2017-003624 // CNNVD: CNNVD-201704-986 // NVD: CVE-2017-2312

REFERENCES

url:http://www.securityfocus.com/bid/97611

Trust: 1.7

url:https://kb.juniper.net/jsa10777

Trust: 1.7

url:http://www.securitytracker.com/id/1038252

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2312

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2312

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://www.juniper.net/us/en/products-services/nos/junos/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10777&cat=sirt_1&actp=list

Trust: 0.3

sources: VULHUB: VHN-110515 // BID: 97611 // JVNDB: JVNDB-2017-003624 // CNNVD: CNNVD-201704-986 // NVD: CVE-2017-2312

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 97611

SOURCES

db:VULHUBid:VHN-110515
db:BIDid:97611
db:JVNDBid:JVNDB-2017-003624
db:CNNVDid:CNNVD-201704-986
db:NVDid:CVE-2017-2312

LAST UPDATE DATE

2025-04-20T23:26:07.437000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110515date:2019-10-03T00:00:00
db:BIDid:97611date:2017-05-23T16:28:00
db:JVNDBid:JVNDB-2017-003624date:2017-05-31T00:00:00
db:CNNVDid:CNNVD-201704-986date:2019-10-23T00:00:00
db:NVDid:CVE-2017-2312date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-110515date:2017-04-24T00:00:00
db:BIDid:97611date:2017-04-12T00:00:00
db:JVNDBid:JVNDB-2017-003624date:2017-05-31T00:00:00
db:CNNVDid:CNNVD-201704-986date:2017-04-12T00:00:00
db:NVDid:CVE-2017-2312date:2017-04-24T15:59:00.143