CVE-2024-39556Stack-based Buffer Overflow in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 83.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 10
Latest updateJul 11

Description

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limite

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.1-EVO22.1R3-S6-EVO+6
CVEListV5juniper_networks/junos_os22.122.1R3-S6+6
NVDjuniper/junos< 21.4+7

🔴Vulnerability Details

2
GHSA
GHSA-4fvx-2mxh-x7v7: A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attac2024-07-11
CVEList
Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow2024-07-10

📋Vendor Advisories

1
Juniper
CVE-2024-39556: A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attac2024-07-10
CVE-2024-39556 — Stack-based Buffer Overflow | cvebase