CVE-2024-39516Out-of-bounds Read in Networks Junos OS

CWE-125Out-of-bounds Read4 documents4 sources
Severity
8.7HIGHNVD
EPSS
0.4%
top 40.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptio

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R3-S5-EVO+10
CVEListV5juniper_networks/junos_os22.222.2R3-S5+10
NVDjuniper/junos< 21.4+6

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash2024-10-09
GHSA
GHSA-qr97-x53q-9m8f: An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated2024-10-09

📋Vendor Advisories

1
Juniper
CVE-2024-39516: An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticat2024-10-09
CVE-2024-39516 — Out-of-bounds Read | cvebase