A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Following messages will be logged prior to the crash: Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:35 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:37 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:44 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:47 Feb 2 10:14:39 fpc0 audit[16263]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm=EvoAftManBt-mai exe=/usr/sbin/evo-aftmand-bt sig=11 Feb 2 10:14:39 fpc0 kernel: audit: type=1701 audit(1612260879.272:17): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm=EvoAftManBt-mai exe=/usr/sbin/evo-aftmand-bt sig=1 This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO.
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Junos_os_evolved | Juniper | 19.2-r1 (including) | 19.2-r1 (including) |
Junos_os_evolved | Juniper | 19.2-r2 (including) | 19.2-r2 (including) |
Junos_os_evolved | Juniper | 19.3-r1 (including) | 19.3-r1 (including) |
Junos_os_evolved | Juniper | 19.3-r2 (including) | 19.3-r2 (including) |
Junos_os_evolved | Juniper | 19.4-r1 (including) | 19.4-r1 (including) |
Junos_os_evolved | Juniper | 19.4-r2 (including) | 19.4-r2 (including) |
Junos_os_evolved | Juniper | 19.4-r2-s1 (including) | 19.4-r2-s1 (including) |
Junos_os_evolved | Juniper | 20.1 (including) | 20.1 (including) |
Junos_os_evolved | Juniper | 20.1-r1 (including) | 20.1-r1 (including) |
Junos_os_evolved | Juniper | 20.1-r1-s1 (including) | 20.1-r1-s1 (including) |
Junos_os_evolved | Juniper | 20.2 (including) | 20.2 (including) |
Junos_os_evolved | Juniper | 20.3 (including) | 20.3 (including) |
Junos_os_evolved | Juniper | 20.3-r1 (including) | 20.3-r1 (including) |
Junos_os_evolved | Juniper | 20.4-r1 (including) | 20.4-r1 (including) |
Junos_os_evolved | Juniper | 21.1-r1 (including) | 21.1-r1 (including) |
The programmer may assume that certain events or conditions will never occur or do not need to be worried about, such as low memory conditions, lack of access to resources due to restrictive permissions, or misbehaving clients or components. However, attackers may intentionally trigger these unusual conditions, thus violating the programmer’s assumptions, possibly introducing instability, incorrect behavior, or a vulnerability. Note that this entry is not exclusively about the use of exceptions and exception handling, which are mechanisms for both checking and handling unusual or unexpected conditions.