{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-39543","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2024-06-25T15:12:53.245Z","datePublished":"2024-07-11T16:21:38.508Z","dateUpdated":"2024-08-02T04:26:15.957Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"21.2R3-S8","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.4R3-S8","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.2R3-S4","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R3-S3","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R3-S2","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R2-S1","status":"affected","version":"23.2","versionType":"semver"},{"lessThan":"23.4R2","status":"affected","version":"23.4","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"21.2R3-S8-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.4R3-S8-EVO","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.2R3-S4-EVO","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R3-S3-EVO","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R3-S2-EVO","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R2-S1-EVO","status":"affected","version":"23.2","versionType":"semver"},{"lessThan":"23.4R2-EVO","status":"affected","version":"23.4","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>To be affected by this issue rpki-rtr session needs to be UP with the DUT with a given IP or by way of configuration.</p>More information regarding the config can be found here:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/validation-edit-routing-options.html\">https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/validation-edit-routing-options.html</a><br><p></p><br><br><br>"}],"value":"To be affected by this issue rpki-rtr session needs to be UP with the DUT with a given IP or by way of configuration.\n\nMore information regarding the config can be found here:  https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/validation-edit-routing-options.html"}],"datePublic":"2024-07-10T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A Buffer Copy without Checking Size of Input&nbsp;vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash,&nbsp;creating a Denial of Service (DoS) condition.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.</span><br><br></span><p>This issue affects&nbsp;</p><p>Junos OS:&nbsp;</p><p></p><ul><li>All versions before 21.2R3-S8,&nbsp;</li><li>from 21.4 before 21.4R3-S8,</li><li>from 22.2 before 22.2R3-S4,&nbsp;</li><li>from 22.3 before 22.3R3-S3,&nbsp;</li><li>from 22.4 before 22.4R3-S2,&nbsp;</li><li>from 23.2 before 23.2R2-S1,&nbsp;</li><li>from 23.4 before 23.4R2.</li></ul><br><span style=\"background-color: rgb(255, 255, 255);\">Junos OS Evolved:</span><ul><li><span style=\"background-color: rgb(255, 255, 255);\">All versions before 21.2R3-S8-EVO,</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 21.4 before 21.4R3-S8-EVO,</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 22.2 before 22.2R3-S4-EVO,&nbsp;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 22.3 before 22.3R3-S3-EVO,</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 22.4 before 22.4R3-S2-EVO,&nbsp;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 23.2 before 23.2R2-S1-EVO,</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">from 23.4 before 23.4R2-EVO.</span></li></ul>"}],"value":"A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects \n\nJunos OS: \n\n\n\n  *  All versions before 21.2R3-S8, \n  *  from 21.4 before 21.4R3-S8,\n  *  from 22.2 before 22.2R3-S4, \n  *  from 22.3 before 22.3R3-S3, \n  *  from 22.4 before 22.4R3-S2, \n  *  from 23.2 before 23.2R2-S1, \n  *  from 23.4 before 23.4R2.\n\n\n\nJunos OS Evolved:  *  All versions before 21.2R3-S8-EVO,\n  *  from 21.4 before 21.4R3-S8-EVO,\n  *  from 22.2 before 22.2R3-S4-EVO, \n  *  from 22.3 before 22.3R3-S3-EVO,\n  *  from 22.4 before 22.4R3-S2-EVO, \n  *  from 23.2 before 23.2R2-S1-EVO,\n  *  from 23.4 before 23.4R2-EVO."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/R:A","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-07-11T16:21:38.508Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA83004"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: <br><br>Junos OS: 21.2R3-S8, 21.4R3-S8, 22.2R3-S4, 22.3R3-S3, 22.4R3-S2, 23.2R2-S1, 23.4R2, 24.2R1, and all subsequent releases.<br><br>\nJunos OS Evolved:&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO 22.4R3-S2-EVO, 23.2R2-S1-EVO, 23.4R2-EVO, 24.2R1-EVO,&nbsp;and all subsequent releases.</span><br>"}],"value":"The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 21.2R3-S8, 21.4R3-S8, 22.2R3-S4, 22.3R3-S3, 22.4R3-S2, 23.2R2-S1, 23.4R2, 24.2R1, and all subsequent releases.\n\n\nJunos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO 22.4R3-S2-EVO, 23.2R2-S1-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases."}],"source":{"advisory":"JSA83004","defect":["1803120"],"discovery":"INTERNAL"},"title":"Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"There are no known workarounds for this issue."}],"value":"There are no known workarounds for this issue."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-11T18:59:17.569893Z","id":"CVE-2024-39543","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-11T18:59:25.632Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T04:26:15.957Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA83004"}]}]}}