Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r6wp-r547-f9gf

Опубликовано: 13 окт. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS).

Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

Note: This issue is not noticed when all the devices in the network are Juniper devices.

This issue affects Juniper Networks:

Junos OS:

  • All versions prior to 20.4R3-S7;
  • 21.2 versions prior to 21.2R3-S5;
  • 21.3 versions prior to 21.3R3-S4;
  • 21.4 versions prior to 21.4R3-S4;
  • 22.1 versions prior to 22.1R3-S4;
  • 22.2 versions prior to 22.2R3;
  • 22.3 versions prior to 22.3R3;
  • 22.4 versions prior to 22.4R3.

Junos OS Evolved:

  • All versions prior to 22.3R3-EVO;
  • 22.4-EVO versions prior to 22.4R3-EVO;
  • 23.2-EVO versions prior to 23.2R1-EVO.

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS).

Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

Note: This issue is not noticed when all the devices in the network are Juniper devices.

This issue affects Juniper Networks:

Junos OS:

  • All versions prior to 20.4R3-S7;
  • 21.2 versions prior to 21.2R3-S5;
  • 21.3 versions prior to 21.3R3-S4;
  • 21.4 versions prior to 21.4R3-S4;
  • 22.1 versions prior to 22.1R3-S4;
  • 22.2 versions prior to 22.2R3;
  • 22.3 versions prior to 22.3R3;
  • 22.4 versions prior to 22.4R3.

Junos OS Evolved:

  • All versions prior to 22.3R3-EVO;
  • 22.4-EVO versions prior to 22.4R3-EVO;
  • 23.2-EVO versions prior to 23.2R1-EVO.

EPSS

Процентиль: 39%
0.00171
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-617

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Note: This issue is not noticed when all the devices in the network are Juniper devices. This issue affects Juniper Networks: Junos OS: * All versions prior to 20.4R3-S7; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R3; * 22.4 versions prior to 22.4R3. Junos OS Evolved: * All versions prior to 22.3R3-EVO; * 22.4-EVO versions prior to 22.4R3-EVO; * 23.2-EVO versions prior to 23.2R1-EVO.

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость модуля Packet Forwarding Engine (PFE) операционных систем Junos OS и Junos OS Evolved, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 39%
0.00171
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-617