Vulnerability Description
Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. When RPD is unavailable, routing updates cannot be processed which can lead to an extended network outage. If RSVP is not enabled on an interface, then the issue cannot be triggered via that interface. This issue only affects Juniper Networks Junos OS 16.1 versions prior to 16.1R3. This issue does not affect Junos releases prior to 16.1R1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 16.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104721Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041318Third Party AdvisoryVDB Entry
- https://kb.juniper.net/JSA10861MitigationVendor Advisory
- http://www.securityfocus.com/bid/104721Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041318Third Party AdvisoryVDB Entry
- https://kb.juniper.net/JSA10861MitigationVendor Advisory
FAQ
What is CVE-2018-0027?
CVE-2018-0027 is a vulnerability with a CVSS score of 7.5 (HIGH). Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. When RPD is unavailable, routing updates cannot be processed which can lead to an exte...
How severe is CVE-2018-0027?
CVE-2018-0027 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-0027?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.