"value":"This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.\n\nA\u00a0double-free vulnerability\u00a0in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).\n\n\nThis issue affects:\n\nJunos OS:\u00a0 * from 22.4 before 22.4R3-S4.\n\n\nJunos OS Evolved: * from 22.4 before 22.4R3-S4-EVO."
"value":"<p>There are no known workarounds for this issue.</p>"
}
],
"value":"There are no known workarounds for this issue."
}
],
"exploit":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"The following software releases have been updated to resolve this specific issue:<br> <br>Junos OS: <span style=\"background-color: rgb(255, 255, 255);\">22.4R3-S4</span> and all subsequent releases.<br><br>\nJunos OS Evolved: <span style=\"background-color: rgb(255, 255, 255);\">22.4R3-S4-EVO and all subsequent releases. </span><br>"
}
],
"value":"The following software releases have been updated to resolve this specific issue:\n \nJunos OS: 22.4R3-S4\u00a0and all subsequent releases.\n\n\nJunos OS Evolved:\u00a022.4R3-S4-EVO and all subsequent releases."
}
],
"credits":[
{
"lang":"en",
"value":"Juniper SIRT would like to acknowledge and thank Craig Dods (cdods@meta.com) from Meta for responsibly reporting this vulnerability."