CVE-2021-0293 - Missing Release of Memory after Effective Lifetime

Severity

55%

Complexity

18%

Confidentiality

60%

A vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lifetime leads to a memory leak each time the CLI command 'show system connections extensive' is executed. The amount of memory leaked on each execution depends on the number of TCP connections from and to the system. Repeated execution will cause more memory to leak and eventually daemons that need to allocate additionally memory and ultimately the kernel to crash, which will result in traffic loss. Continued execution of this command will cause a sustained Denial of Service (DoS) condition. An administrator can use the following CLI command to monitor for increase in memory consumption of the netstat process, if it exists: user@junos> show system processes extensive | match "username|netstat" PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 21181 root 100 0 5458M 4913M CPU3 2 0:59 97.27% netstat The following log message might be observed if this issue happens: kernel: %KERN-3: pid 21181 (netstat), uid 0, was killed: out of swap space This issue affects Juniper Networks Junos OS 18.2 versions prior to 18.2R2-S8, 18.2R3-S7. 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R1-S4, 19.4R2-S3, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2; This issue does not affect Juniper Networks Junos OS versions prior to 18.2R1.

CVSS 3.1 Base Score 5.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 2.1. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).

Demo Examples

Missing Release of Memory after Effective Lifetime

CWE-401

The following C function leaks a block of allocated memory if the call to read() does not return the expected number of bytes:


               
}
return buf;
return NULL;
return NULL;

Overview

Type

Juniper

First reported 3 years ago

2021-07-15 20:15:00

Last updated 3 years ago

2021-07-29 15:39:00

Affected Software

Juniper JUNOS 18.2

18.2

Juniper JunOS 18.2 R1

18.2

Juniper JunOS 18.2 R1-S3

18.2

Juniper JUNOS 18.2 R1-S5

18.2

Juniper JUNOS 18.2 R2-S1

18.2

Juniper JUNOS 18.2R2-S2

18.2

Juniper JUNOS 18.2R2-S3

18.2

Juniper JUNOS 18.3 R1-S1

18.3

Juniper JUNOS 18.3 R2

18.3

Juniper JUNOS 18.3 R1

18.3

Juniper JUNOS 18.3 R1-S2

18.3

Juniper JUNOS 18.3

18.3

Juniper JUNOS 18.3R1-S3

18.3

Juniper JUNOS18.2 R2-S4

18.2

Juniper JUNOS 18.2R3

18.2

Juniper JUNOS 18.2 R2-S5

18.2

Juniper JUNOS 18.2 R2-S6

18.2

Juniper JUNOS 18.3 R1-S5

18.3

Juniper JUNOS 18.2 R3-S1

18.2

Juniper JUNOS 18.3 R2-S1

18.3

Juniper JUNOS 18.3 R2-S2

18.3

Juniper JUNOS 18.3 R1-S6

18.3

Juniper JUNOS 18.2 R3-S2

18.2

Juniper JUNOS 18.2 R3-S3

18.2

Juniper JunOS 18.4 R1

18.4

Juniper JUNOS 18.4

18.4

Juniper Junos OS 18.4 R1-S1

18.4

Juniper JUNOS 18.4R1-S2

18.4

Juniper Junos OS 19.1 R1

19.1

Juniper Junos OS 19.1

19.1

Juniper Junos OS 19.2 R1

19.2

Juniper JUNOS 18.4R2

18.4

Juniper Junos OS 19.1 R1-s1

19.1

Juniper JUNOS 19.1 R1-S3

19.1

Juniper JUNOS 19.1 R1-S2

19.1

Juniper JUNOS 18.4 R1-S5

18.4

Juniper JUNOS 19.2 R1-S1

19.2

Juniper JUNOS 19.2 R1-S2

19.2

Juniper JUNOS 18.4 R2-S1

18.4

Juniper Junos OS 19.2

19.2

Juniper JUNOS 18.4 R2-S2

18.4

Juniper JUNOS 18.3 R3

18.3

Juniper Junos OS 19.1 R2

19.1

Juniper JUNOS 18.4 R3

18.4

Juniper JUNOS 18.4 R2-S3

18.4

Juniper JUNOS 18.3 R3-S1

18.3

Juniper JUNOS 19.1 R1-S4

19.1

Juniper JUNOS 18.4 R1-S6

18.4

Juniper JUNOS 18.3 R2-S3

18.3

Juniper JUNOS 19.3

19.3

Juniper JUNOS 19.3 R1

19.3

Juniper JUNOS 19.2 R1-S3

19.2

Juniper JUNOS 19.4 R1

19.4

Juniper JUNOS 19.3 R2

19.3

Juniper JUNOS 19.3 R2-S1

19.3

Juniper JUNOS 19.3 R1-S1

19.3

Juniper JUNOS 20.1 R1

20.1

Juniper JUNOS 19.4 R1-S1

19.4

Juniper JUNOS 19.3 R2-S2

19.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.