CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
61.0%
An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message “mbuf exceed” – an indication of memory buffer exhaustion – due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which can be identified through the following log messages: all_logs.0:Jun 8 03:25:03 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 50%. all_logs.0:Jun 8 03:25:13 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 51%. all_logs.0:Jun 8 03:25:24 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 52%. … Eventually the system runs out of mbufs and the system crashes (fails over) with the error “mbuf exceed”. This issue only occurs when HTTP AV inspection is configured. Devices configured for Web Filtering alone are unaffected by this issue. Affected releases are Junos OS on SRX Series: 12.1X46 versions prior to 12.1X46-D81; 12.3X48 versions prior to 12.3X48-D77; 15.1X49 versions prior to 15.1X49-D101, 15.1X49-D110.
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:* |
[
{
"platforms": [
"SRX Series"
],
"product": "Junos OS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "12.1X46-D81",
"status": "affected",
"version": "12.1X46",
"versionType": "custom"
},
{
"lessThan": "12.3X48-D77",
"status": "affected",
"version": "12.3X48",
"versionType": "custom"
},
{
"lessThan": "15.1X49-D101, 15.1X49-D110",
"status": "affected",
"version": "15.1X49",
"versionType": "custom"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
61.0%