Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c84c-ph5v-qwvg

Опубликовано: 09 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).  Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

When an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart.

This issue affects:

Junos OS:

  • All versions before 21.2R3-S9, 
  • from 21.4 before 21.4R3-S10, 
  • from 22.2 before 22.2R3-S6, 
  • from 22.4 before 22.4R3-S6, 
  • from 23.2 before 23.2R2-S3, 
  • from 23.4 before 23.4R2-S4, 
  • from 24.2 before 24.2R2; 

Junos OS Evolved: 

  • All versions before 21.4R3-S10-EVO,
  • from 22.2-EVO before 22.2R3-S6-EVO, 
  • from 22.4-EVO...

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).  Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

When an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart.

This issue affects:

Junos OS:

  • All versions before 21.2R3-S9, 
  • from 21.4 before 21.4R3-S10, 
  • from 22.2 before 22.2R3-S6, 
  • from 22.4 before 22.4R3-S6, 
  • from 23.2 before 23.2R2-S3, 
  • from 23.4 before 23.4R2-S4, 
  • from 24.2 before 24.2R2; 

Junos OS Evolved: 

  • All versions before 21.4R3-S10-EVO,
  • from 22.2-EVO before 22.2R3-S6-EVO, 
  • from 22.4-EVO before 22.4R3-S6-EVO, 
  • from 23.2-EVO before 23.2R2-S3-EVO, 
  • from 23.4-EVO before 23.4R2-S4-EVO, 
  • from 24.2-EVO before 24.2R2-EVO.

EPSS

Процентиль: 33%
0.00132
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-195

Связанные уязвимости

CVSS3: 6.5
nvd
10 месяцев назад

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).  Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. When an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S6,  * from 22.4 before 22.4R3-S6,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S4,  * from 24.2 before 24.2R2;  Junos OS Evolved:  * All versions before 21.4R3-S10-EVO, * from 22.2-EVO before 22.2R3-S6-EVO,  * from 22.4-EVO be

CVSS3: 6.5
fstec
10 месяцев назад

Уязвимость демона протоколов управления (l2cpd) операционных систем Juniper Networks Junos OS и Junos OS Evolved, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 33%
0.00132
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-195