Description

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS:  * from 22.4 before 22.4R3-S4. Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.

INFO

Published Date :

2025-02-05T15:31:23.063Z

Last Modified :

2025-02-26T18:16:35.494Z

Source :

juniper
AFFECTED PRODUCTS

The following products are affected by CVE-2024-39564 vulnerability.

Vendors Products
Juniper
  • Junos
  • Junos Os Evolved
Juniper Networks
  • Junos Os
  • Junos Os Evolved
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-39564.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact