Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-99g6-3hjh-hcxr

Опубликовано: 12 апр. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).

If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed TLV, rpd will crash and restart. This issue affects:

Junos OS:

  • all versions before 21.2R3-S7, 

  • from 21.3 before 21.3R3-S5, 

  • from 21.4 before 21.4R3-S5, 

  • from 22.1 before 22.1R3-S5, 

  • from 22.2 before 22.2R3-S3, 

  • from 22.3 before 22.3R3-S2, 

  • from 22.4 before 22.4R3, 

  • from 23.2 before 23.2R1-S2, 23.2R2.

Junos OS Evolved:

  • all versions before 21.2R3-S7-EVO, 

  • from 21.3-EVO before 21.3R3-S5-EVO, 

  • from 21.4-EVO before 21.4R3-S5-EVO, 

  • from 22.2-EVO before 22.2R3-S3-EVO, 

  • from 22.3-EVO before 22.3R3-S2-EVO, 

  • from 22.4-EVO before 22.4R3-EVO, ...

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).

If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed TLV, rpd will crash and restart. This issue affects:

Junos OS:

  • all versions before 21.2R3-S7, 

  • from 21.3 before 21.3R3-S5, 

  • from 21.4 before 21.4R3-S5, 

  • from 22.1 before 22.1R3-S5, 

  • from 22.2 before 22.2R3-S3, 

  • from 22.3 before 22.3R3-S2, 

  • from 22.4 before 22.4R3, 

  • from 23.2 before 23.2R1-S2, 23.2R2.

Junos OS Evolved:

  • all versions before 21.2R3-S7-EVO, 

  • from 21.3-EVO before 21.3R3-S5-EVO, 

  • from 21.4-EVO before 21.4R3-S5-EVO, 

  • from 22.2-EVO before 22.2R3-S3-EVO, 

  • from 22.3-EVO before 22.3R3-S2-EVO, 

  • from 22.4-EVO before 22.4R3-EVO, 

  • from 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO.

This is a related but separate issue than the one described in JSA75739

EPSS

Процентиль: 34%
0.00136
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-1287

Связанные уязвимости

CVSS3: 7.5
nvd
почти 2 года назад

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed TLV, rpd will crash and restart. This issue affects: Junos OS: * all versions before 21.2R3-S7,  * from 21.3 before 21.3R3-S5,  * from 21.4 before 21.4R3-S5,  * from 22.1 before 22.1R3-S5,  * from 22.2 before 22.2R3-S3,  * from 22.3 before 22.3R3-S2,  * from 22.4 before 22.4R3,  * from 23.2 before 23.2R1-S2, 23.2R2. Junos OS Evolved: * all versions before 21.2R3-S7-EVO,  * from 21.3-EVO before 21.3R3-S5-EVO,  * from 21.4-EVO before 21.4R3-S5-EVO,  * from 22.2-EVO before 22.2R3-S3-EVO,  * from 22.3-EVO before 22.3R3-S2-EVO,  * from 22.4-EVO before 22.4R3-EVO, 

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость демона Routing Protocols Daemon (RPD) операционных систем Juniper Networks Junos OS и Junos OS Evolved, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 34%
0.00136
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-1287