THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-39556

Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow

Assignerjuniper
Reserved2024-06-25
Published2024-07-10
Updated2024-07-13

Description

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the local user's command interpreter, or potentially trigger a stack-based buffer overflow. This issue affects:  Junos OS: * All versions before 21.4R3-S7, * from 22.1 before 22.1R3-S6, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2;  Junos OS Evolved: * All versions before 21.4R3-S7-EVO, * from 22.1-EVO before 22.1R3-S6-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S3-EVO, * from 22.4-EVO before 22.4R3-S2-EVO, * from 23.2-EVO before 23.2R2-EVO, * from 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO.



MEDIUM: 6.4CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
HIGH: 7.1CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

Any version before 21.4R3-S7
affected

22.1 before 22.1R3-S6
affected

22.2 before 22.2R3-S4
affected

22.3 before 22.3R3-S3
affected

22.4 before 22.4R3-S2
affected

23.2 before 23.2R2
affected

23.4 before 23.4R1-S1, 23.4R2
affected

Default status
unaffected

Any version before 21.4R3-S7-EVO
affected

22.1-EVO before 22.1R3-S6-EVO
affected

22.2-EVO before 22.2R3-S4-EVO
affected

22.3-EVO before 22.3R3-S3-EVO
affected

22.4-EVO before 22.4R3-S2-EVO
affected

23.2-EVO before 23.2R2-EVO
affected

23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO
affected

References

https://supportportal.juniper.net/JSA83016 vendor-advisory

cve.org CVE-2024-39556

nvd.nist.gov CVE-2024-39556

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-39556
© Copyright 2024 THREATINT. Made in Cyprus with +