CVE-2024-39543Classic Buffer Overflow in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 64.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Junos OS: * All versions before 21.2R3-S8, * from 21.4 befor

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.421.4R3-S8-EVO+6
CVEListV5juniper_networks/junos_os21.421.4R3-S8+6
NVDjuniper/junos< 21.2+7

🔴Vulnerability Details

2
GHSA
GHSA-jgqx-5mhh-hg95: A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Juno2024-07-11
CVEList
Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39543: A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Juno2024-07-11
CVE-2024-39543 — Classic Buffer Overflow | cvebase