THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-39560

Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash

Assignerjuniper
Reserved2024-06-25
Published2024-07-10
Updated2024-07-11

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS). The kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected. System kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below: user@router> show system statistics kernel memory Memory               Size (kB) Percentage When   Active                 753092     18.4% Now   Inactive               574300     14.0% Now   Wired                  443236     10.8% Now   Cached                1911204     46.6% Now   Buf                     32768      0.8% Now   Free                   385072      9.4% Now Kernel Memory                             Now   Data                   312908      7.6% Now   Text                     2560      0.1% Now ... This issue affects: Junos OS: * All versions before 20.4R3-S9, * All versions of 21.2, * from 21.4 before 21.4R3-S5, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3, * from 23.2 before 23.2R2; Junos OS Evolved: * All versions before 21.4R3-S5-EVO, * from 22.1-EVO before 22.1R3-S5-EVO, * from 22.2-EVO before 22.2R3-S3-EVO, * from 22.3-EVO before 22.3R3-S2-EVO, * from 22.4-EVO before 22.4R3-EVO, * from 23.2-EVO before 23.2R2-EVO.



MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Problem types

CWE-755 Improper Handling of Exceptional Conditions

Product status

Default status
unaffected

Any version before 20.4R3-S9
affected

21.4 before 21.4R3-S5
affected

22.1 before 22.1R3-S5
affected

22.2 before 22.2R3-S3
affected

22.3 before 22.3R3-S2
affected

22.4 before 22.4R3
affected

23.2 before 23.2R2
affected

21.2R1 before 21.2*
affected

Default status
unaffected

Any version before 21.4R3-S5-EVO
affected

22.1-EVO before 22.1R3-S5-EVO
affected

22.2-EVO before 22.2R3-S3-EVO
affected

22.3-EVO before 22.3R3-S2-EVO
affected

22.4-EVO before 22.4R3-EVO
affected

23.2-EVO before 23.2R2-EVO
affected

Timeline

2024-07-10:Initial Publication

References

https://supportportal.juniper.net/JSA83020 vendor-advisory

cve.org CVE-2024-39560

nvd.nist.gov CVE-2024-39560

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-39560
© Copyright 2024 THREATINT. Made in Cyprus with +