Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-39517 | First vendor Publication | 2024-07-10 |
Vendor | Cve | Last vendor Modification | 2025-02-07 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
An Improper Check for Unusual or Exceptional Conditions vulnerability in theĀ Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services. This issue affects both IPv4 and IPv6 implementations. This issue affects Junos OS: All versions earlier thanĀ 21.4R3-S7; 22.1Ā versions earlier than 22.1R3-S5; 22.2 versions earlier thanĀ 22.2R3-S3; 22.3 versions earlier thanĀ 22.3R3-S3; 22.4 versions earlier thanĀ 22.4R3-S2; 23.2 versions earlier thanĀ 23.2R2; 23.4 versions earlier thanĀ 23.4R1-S1. Junos OS Evolved: All versions earlier thanĀ 21.4R3-S7-EVO; 22.1-EVO versions earlier thanĀ 22.1R3-S5-EVO; 22.2-EVO versions earlier thanĀ 22.2R3-S3-EVO; 22.3-EVO versions earlier than 22.3R3-S3-EVO; 22.4-EVO versions earlier thanĀ 22.4R3-S2-EVO; 23.2-EVO versions earlier thanĀ 23.2R2-EVO; 23.4-EVO versions earlier thanĀ 23.4R1-S1-EVO, 23.4R2-EVO. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39517 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-03-29 03:37:58 |
|
2025-03-28 13:43:18 |
|
2025-03-15 03:11:33 |
|
2025-02-08 05:20:50 |
|
2024-11-25 09:24:02 |
|
2024-07-11 17:27:23 |
|
2024-07-11 05:27:24 |
|