跳转到帖子

Juniper Junos OS: 2024-01 Security Bulletin: Junos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd crash (JSA75754) (multiple CVEs)

recommended_posts

发布于
  • Members

Juniper Junos OS: 2024-01 Security Bulletin: Junos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd crash (JSA75754) (multiple CVEs)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/10/2024
Created
01/12/2024
Added
01/11/2024
Modified
01/31/2024

Description

An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, when specific TCP packets are received on an open OFP port, the OFP crashes leading to a restart of Routine Engine (RE). Continuous receipt of these specific TCP packets will lead to a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS Evolved *All versions earlier than 21.2R3-S7-EVO; *21.3 versions earlier than 21.3R3-S5-EVO ; *21.4 versions earlier than 21.4R3-S5-EVO; *22.1 versions earlier than 22.1R3-S4-EVO; *22.2 versions earlier than 22.2R3-S3-EVO ; *22.3 versions earlier than 22.3R3-EVO; *22.4 versions earlier than 22.4R2-EVO, 22.4R3-EVO.

Solution(s)

  • juniper-junos-os-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-21612
  • CVE - 2024-21612
  • CVE - 2024-21613
  • JSA75754
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…