CVE-2024-39560Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 64.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 10
Latest updateJul 11

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS). The kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected. System kernel memory can be monitored through the use

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.1-EVO22.1R3-S5-EVO+5
CVEListV5juniper_networks/junos_os21.2R121.2*+7
NVDjuniper/junos21.221.3+8

🔴Vulnerability Details

2
GHSA
GHSA-gc6q-hh4v-5gvq: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-11
CVEList
Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash2024-07-10

📋Vendor Advisories

1
Juniper
CVE-2024-39560: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-10
CVE-2024-39560 — Networks Junos OS vulnerability | cvebase