CVE-2021-31383Stack-based Buffer Overflow in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS). Continued receipt and processing of these packets w

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved20.120.1R3-EVO+2
CVEListV5juniper_networks/junos_os19.219.2R3-S2+5
NVDjuniper/junos_os_evolved20.1, 20.2, 20.3+2
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-m54q-hvr6-96wf: In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination2022-05-24
CVEList
Junos OS and Junos OS Evolved: In Point to MultiPoint (P2MP) scenarios receipt of various crafted packets causes RPD to core.2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31383: In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination2021-10-19
CVE-2021-31383 — Stack-based Buffer Overflow | cvebase