We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-30401

Junos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman



Assignerjuniper
Reserved2024-03-26
Published2024-04-12
Updated2024-08-02

Description

An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC. Through code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow. This issue affects Junos OS on MX Series and EX9200-15C: * from 21.2 before 21.2R3-S1, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2, * from 22.2 before 22.2R2;  This issue does not affect: * versions of Junos OS prior to 20.3R1; * any version of Junos OS 20.4.



MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-125 Out-of-bounds Read

Denial of Service (DoS)

Product status

Default status
unaffected

21.2 before 21.2R3-S1
affected

21.4 before 21.4R3
affected

22.1 before 22.1R2
affected

22.2 before 22.2R2
affected

Any version before 20.3R1
unaffected

20.4
unaffected

References

https://supportportal.juniper.net/JSA79110 vendor-advisory

https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N technical-description

cve.org CVE-2024-30401

nvd.nist.gov CVE-2024-30401

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.