Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6chq-9qg2-rx7f

Опубликовано: 05 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.

A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).

This issue affects:

Junos OS:  * from 22.4 before 22.4R3-S4.

Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.

A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).

This issue affects:

Junos OS:  * from 22.4 before 22.4R3-S4.

Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.

EPSS

Процентиль: 47%
0.0024
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-415

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS:  * from 22.4 before 22.4R3-S4. Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.

EPSS

Процентиль: 47%
0.0024
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-415