跳转到帖子

Juniper Junos OS: 2024-07 Security Bulletin: Junos OS: MX240, MX480, MX960 platforms using MPC10E: Memory leak will be observed when subscribed to a specific subscription on Junos Telemetry Interface (JSA82982) (CVE-2024-39518)

recommended_posts

发布于
  • Members

Juniper Junos OS: 2024-07 Security Bulletin: Junos OS: MX240, MX480, MX960 platforms using MPC10E: Memory leak will be observed when subscribed to a specific subscription on Junos Telemetry Interface (JSA82982) (CVE-2024-39518)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
07/10/2024
Created
07/12/2024
Added
07/11/2024
Modified
01/28/2025

Description

A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service (DoS). When the device is subscribed to a specific subscription on Junos Telemetry Interface, a slow memory leak occurs and eventually all resources are consumed and the device becomes unresponsive. A manual reboot of the Line Card will be required to restore the device to its normal functioning.  This issue is only seen when telemetry subscription is active. The Heap memory utilization can be monitored using the following command:   > show system processes extensive The following command can be used to monitor the memory utilization of the specific sensor   > show system info | match sensord PID NAME MEMORY PEAK MEMORY%CPU THREAD-COUNT CORE-AFFINITY UPTIME 1986sensord877.57MB 877.57MB 2 4 0,2-157-21:41:32 This issue affects Junos OS:  *from 21.2R3-S5 before 21.2R3-S7,  *from 21.4R3-S4 before 21.4R3-S6,  *from 22.2R3 before 22.2R3-S4,  *from 22.3R2 before 22.3R3-S2,  *from 22.4R1 before 22.4R3,  *from 23.2R1 before 23.2R2.

Solution(s)

  • juniper-junos-os-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-39518
  • CVE - 2024-39518
  • JSA82982
  • 查看数 699
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…