Executive Summary

Informations
Name CVE-2024-39541 First vendor Publication 2024-07-11
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).

When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.

This issue affects:

Junos OS:

* 22.4 versions before 22.4R3-S1,
* 23.2 versions before 23.2R2,Â
* 23.4 versions before 23.4R1-S1, 23.4R2,Â

This issue does not affect Junos OS versions earlier than 22.4R1.

Junos OS Evolved:

* 22.4-EVO versions before 22.4R3-S2-EVO,
* 23.2-EVO versions before 23.2R2-EVO,
* 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,

This issue does not affect Junos OS Evolved versions earlier than

before 22.4R1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39541

Sources (Detail)

https://supportportal.juniper.net/JSA83001
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-11-25 09:24:01
  • Multiple Updates
2024-07-12 00:27:23
  • Multiple Updates
2024-07-11 21:27:22
  • First insertion