Description
A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and at the same time a specific SNMP request is received, a segmentation fault occurs which causes rpd to crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S8, * 21.4 versions before 21.4R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * 21.4-EVO versions before 21.4R3-S5-EVO, * 22.2-EVO versions before 22.2R3-S3-EVO, * 22.3-EVO versions before 22.3R3-S2-EVO, * 22.4-EVO versions before 22.4R3-EVO, * 23.2-EVO versions before 23.2R2-EVO.
INFO
Published Date :
2024-07-11T16:02:45.680Z
Last Modified :
2024-08-02T04:26:15.902Z
Source :
juniper
AFFECTED PRODUCTS
The following products are affected by CVE-2024-39528 vulnerability.
| Vendors | Products |
|---|---|
| Juniper |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-39528.
| URL | Resource |
|---|---|
| https://supportportal.juniper.net/JSA82987 |
|