CVE-2024-39564

CWE-4154 documents4 sources
Severity
8.7HIGH
EPSS
0.3%
top 43.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 5

Description

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS: * from 22.4 before 22.4R3-S4. Junos OS Evolved

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.422.4R3-S3-EVO
CVEListV5juniper_networks/junos_os22.422.4R3-S4
NVDjuniper/junos< 21.2+7

🔴Vulnerability Details

2
GHSA
GHSA-6chq-9qg2-rx7f: This is a similar, but different vulnerability than the issue reported as CVE-2024-395492025-02-05
CVEList
Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash2025-02-05

📋Vendor Advisories

1
Juniper
CVE-2024-39564: This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (2025-02-05
CVE-2024-39564 (HIGH CVSS 8.7) | This is a similar | cvebase.io