U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-0008

Change History

CVE Modified by Juniper Networks, Inc. 4/10/2019 5:29:00 PM

Action Type Old Value New Value
Changed Description
A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution.
Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are:
14.1X53;
15.1X53 versions prior to 15.1X53-D235;
17.1 versions prior to 17.1R3;
17.2 versions prior to 17.2R3;
17.3 versions prior to 17.3R3-S2, 17.3R4;
17.4 versions prior to 17.4R2-S1, 17.4R3;
18.1 versions prior to 18.1R3-S1, 18.1R4;
18.2 versions prior to 18.2R2;
18.2X75 versions prior to 18.2X75-D30;
18.3 versions prior to 18.3R2.
A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are: 14.1X53; 15.1X53 versions prior to 15.1X53-D235; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2, 17.3R4; 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1, 18.1R4; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2.