cve/2024/CVE-2024-39560.md
2025-09-29 21:09:30 +02:00

31 lines
2.8 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-39560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39560)
![](https://img.shields.io/static/v1?label=Product&message=Junos%20OS%20Evolved&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Junos%20OS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=21.2R1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=21.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.1-EVO%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.2-EVO%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.3-EVO%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=22.4-EVO%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=23.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=23.2-EVO%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions&color=brightgreen)
### Description
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).The kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.System kernel memory can be monitored through the use of the 'show system kernel memory' command as shown below:user@router> show system kernel memory   Real memory total/reserved: 4130268/ 133344 Kbyteskmem map free: 18014398509110220 KbytesThis issue affects:Junos OS: * All versions before 20.4R3-S9, * All versions of 21.2, * from 21.4 before 21.4R3-S5, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3, * from 23.2 before 23.2R2;Junos OS Evolved: * All versions before 21.4R3-S5-EVO, * from 22.1-EVO before 22.1R3-S5-EVO, * from 22.2-EVO before 22.2R3-S3-EVO, * from 22.3-EVO before 22.3R3-S2-EVO, * from 22.4-EVO before 22.4R3-EVO, * from 23.2-EVO before 23.2R2-EVO.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds