An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).
When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.
This issue affects:
Junos OS:
  *  22.4 versions before 22.4R3-S1,
  *  23.2 versions before 23.2R2, 
  *  23.4 versions before 23.4R1-S1, 23.4R2, 
This issue does not affect Junos OS versions earlier than 22.4R1.
Junos OS Evolved:
  *  22.4-EVO versions before 22.4R3-S2-EVO,
  *  23.2-EVO versions before 23.2R2-EVO,
  *  23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,
This issue does not affect Junos OS Evolved versions earlier than 
before 22.4R1.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://supportportal.juniper.net/JSA83001 |     | 
History
                    No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: juniper
Published: 2024-07-11T16:17:20.730Z
Updated: 2024-08-02T04:26:15.778Z
Reserved: 2024-06-25T15:12:53.244Z
Link: CVE-2024-39541
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-07-11T18:56:43.024Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-07-11T17:15:13.127
Modified: 2024-11-21T09:27:58.117
Link: CVE-2024-39541
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow