Vulnerability Database

290,919

Total vulnerabilities in the database

CVE-2019-0001

Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result in an extended denial of service condition for the device. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S1; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S1; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.

  • Published: Jan 15, 2019
  • Updated: Apr 13, 2023
  • CVE: CVE-2019-0001
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v2:

  • Severity: High
  • Score: 7.1
  • AV:N/AC:M/Au:N/C:N/I:N/A:C

CWEs:

Software From Fixed in
juniper / junos 16.1-r1 16.1-r1.x
juniper / junos 16.1-r4-s4 16.1-r4-s4.x
juniper / junos 16.1-r4 16.1-r4.x
juniper / junos 16.1-r4-s3 16.1-r4-s3.x
juniper / junos 16.1-r3 16.1-r3.x
juniper / junos 16.1-r5 16.1-r5.x
juniper / junos 16.1-r2 16.1-r2.x
juniper / junos 16.1-r6 16.1-r6.x
juniper / junos 16.1-r5-s4 16.1-r5-s4.x
juniper / junos 16.1-r6-s1 16.1-r6-s1.x
juniper / junos 16.1-r7 16.1-r7.x
juniper / junos 16.1-r6-s6 16.1-r6-s6.x
juniper / junos 16.1-r3-s10 16.1-r3-s10.x
juniper / junos 16.1 16.1.x
juniper / junos 16.1-r3-s11 16.1-r3-s11.x
juniper / junos 16.1-r4-s12 16.1-r4-s12.x
juniper / junos 16.1-r4-s6 16.1-r4-s6.x
juniper / junos 16.1-r4-s2 16.1-r4-s2.x
juniper / junos 16.2-r2 16.2-r2.x
juniper / junos 16.2-r1 16.2-r1.x
juniper / junos 16.2-r2-s5 16.2-r2-s5.x
juniper / junos 16.2-r2-s1 16.2-r2-s1.x
juniper / junos 16.2-r2-s2 16.2-r2-s2.x
juniper / junos 16.2-r2-s6 16.2-r2-s6.x
juniper / junos 16.2 16.2.x
juniper / junos 17.1-r1 17.1-r1.x
juniper / junos 17.1-r2 17.1-r2.x
juniper / junos 17.1-r2-s7 17.1-r2-s7.x
juniper / junos 17.1-r2-s1 17.1-r2-s1.x
juniper / junos 17.1-r2-s2 17.1-r2-s2.x
juniper / junos 17.1-r2-s3 17.1-r2-s3.x
juniper / junos 17.1-r2-s4 17.1-r2-s4.x
juniper / junos 17.1-r2-s5 17.1-r2-s5.x
juniper / junos 17.1-r2-s6 17.1-r2-s6.x
juniper / junos 17.1 17.1.x
juniper / junos 17.1-r2-s9 17.1-r2-s9.x
juniper / junos 17.1-r2-s8 17.1-r2-s8.x
juniper / junos 17.2-r1 17.2-r1.x
juniper / junos 17.2-r2 17.2-r2.x
juniper / junos 17.2-r1-s2 17.2-r1-s2.x
juniper / junos 17.2-r2-s6 17.2-r2-s6.x
juniper / junos 17.2-r1-s7 17.2-r1-s7.x
juniper / junos 17.2-r1-s1 17.2-r1-s1.x
juniper / junos 17.2-r1-s3 17.2-r1-s3.x
juniper / junos 17.2-r1-s5 17.2-r1-s5.x
juniper / junos 17.2-r1-s4 17.2-r1-s4.x
juniper / junos 17.2 17.2.x
juniper / junos 17.2-r2-s7 17.2-r2-s7.x
juniper / junos 17.2-r1-s8 17.2-r1-s8.x
juniper / junos 17.2-r2-s11 17.2-r2-s11.x
juniper / junos 17.3-r1 17.3-r1.x
juniper / junos 17.3-r2 17.3-r2.x
juniper / junos 17.3-r2-s2 17.3-r2-s2.x
juniper / junos 17.3-r2-s1 17.3-r2-s1.x
juniper / junos 17.3 17.3.x
juniper / junos 17.3-r3 17.3-r3.x
juniper / junos 17.3-r2-s3 17.3-r2-s3.x
juniper / junos 17.3-r1-s1 17.3-r1-s1.x
juniper / junos 17.3-r2-s4 17.3-r2-s4.x
juniper / junos 17.3-r2-s5 17.3-r2-s5.x
juniper / junos 17.4-r1 17.4-r1.x
juniper / junos 17.4-r1-s1 17.4-r1-s1.x
juniper / junos 17.4-r1-s2 17.4-r1-s2.x
juniper / junos 17.4 17.4.x
juniper / junos 17.4-r1-s5 17.4-r1-s5.x
juniper / junos 17.4-r1-s7 17.4-r1-s7.x
juniper / junos 17.4-r1-s4 17.4-r1-s4.x
juniper / junos 17.4-r1-s6 17.4-r1-s6.x
juniper / junos 18.2-r1 18.2-r1.x
juniper / junos 18.2 18.2.x
juniper / junos 18.2-r1-s3 18.2-r1-s3.x
juniper / junos 18.2-r1-s4 18.2-r1-s4.x
juniper / junos 18.2-r1-s5 18.2-r1-s5.x
fedoraproject / fedora 30 30.x
fedoraproject / fedora 31 31.x