Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v47j-c7r7-829c

Опубликовано: 11 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 7.1
CVSS3: 7.5

Описание

An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted.

This issue affects both IPv4 and IPv6. 

Changes in memory usage can be monitored using the following CLI command: user@device> show system memory node | grep evo-aftmann This issue affects Junos OS Evolved: 

  • All versions before 21.2R3-S8-EVO, 
  • 21.3 versions before 21.3R3-S5-EVO, 
  • 21.4 versions before 21.4R3-S5-EVO, 
  • 22.1 versions before 22.1R3-S4-EVO, 
  • 22.2 versions before 22.2R3-S4-EVO,
  • 22.3 versions before 22.3R3-S3-EVO,
  • 22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO, 
  • 23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO.

An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted.

This issue affects both IPv4 and IPv6. 

Changes in memory usage can be monitored using the following CLI command: user@device> show system memory node | grep evo-aftmann This issue affects Junos OS Evolved: 

  • All versions before 21.2R3-S8-EVO, 
  • 21.3 versions before 21.3R3-S5-EVO, 
  • 21.4 versions before 21.4R3-S5-EVO, 
  • 22.1 versions before 22.1R3-S4-EVO, 
  • 22.2 versions before 22.2R3-S4-EVO,
  • 22.3 versions before 22.3R3-S3-EVO,
  • 22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO, 
  • 23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO.

EPSS

Процентиль: 37%
0.00157
Низкий

7.1 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted. This issue affects both IPv4 and IPv6.  Changes in memory usage can be monitored using the following CLI command: user@device> show system memory node <fpc slot> | grep evo-aftmann This issue affects Junos OS Evolved:  * All versions before 21.2R3-S8-EVO,  * 21.3 versions before 21.3R3-S5-EVO,  * 21.4 versions before 21.4R3-S5-EVO,  * 22.1 versions before 22.1R3-S4-EVO,  * 22.2 versions before 22.2R3-S4-EVO, * 22.3 versions before 22.3R3-S3-EVO, * 22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO,  * 23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость операционных систем Junos OS Evolved, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 37%
0.00157
Низкий

7.1 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-400