An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).
When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.
This issue affects:
Junos OS:
* 22.4 versions before 22.4R3-S1,
* 23.2 versions before 23.2R2,
* 23.4 versions before 23.4R1-S1, 23.4R2,
This issue does not affect Junos OS versions earlier than 22.4R1.
Junos OS Evolved:
* 22.4-EVO versions before 22.4R3-S2-EVO,
* 23.2-EVO versions before 23.2R2-EVO,
* 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,
This issue does not affect Junos OS Evolved versions earlier than
before 22.4R1.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA83001 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2024-07-11T16:17:20.730Z
Updated: 2024-08-02T04:26:15.778Z
Reserved: 2024-06-25T15:12:53.244Z
Link: CVE-2024-39541
Vulnrichment
Updated: 2024-07-11T18:56:43.024Z
NVD
Status : Awaiting Analysis
Published: 2024-07-11T17:15:13.127
Modified: 2024-11-21T09:27:58.117
Link: CVE-2024-39541
Redhat
No data.