Skip to content

An Improper Handling of Exceptional Conditions...

High severity Unreviewed Published Jul 11, 2024 to the GitHub Advisory Database • Updated Jul 31, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).

The kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.

System kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:

user@router> show system statistics kernel memory
Memory               Size (kB) Percentage When
  Active                 753092     18.4% Now
  Inactive               574300     14.0% Now
  Wired                  443236     10.8% Now
  Cached                1911204     46.6% Now
  Buf                     32768      0.8% Now
  Free                   385072      9.4% Now
Kernel Memory                             Now
  Data                   312908      7.6% Now
  Text                     2560      0.1% Now
...

This issue affects:
Junos OS:

  • All versions before 20.4R3-S9,
  • from 21.4 before 21.4R3-S5,
  • from 22.1 before 22.1R3-S5,
  • from 22.2 before 22.2R3-S3,
  • from 22.3 before 22.3R3-S2,
  • from 22.4 before 22.4R3,
  • from 23.2 before 23.2R2;

Junos OS Evolved:

  • All versions before 21.4R3-S5-EVO,
  • from 22.1-EVO before 22.1R3-S5-EVO,
  • from 22.2-EVO before 22.2R3-S3-EVO,
  • from 22.3-EVO before 22.3R3-S2-EVO,
  • from 22.4-EVO before 22.4R3-EVO,
  • from 23.2-EVO before 23.2R2-EVO.

References

Published by the National Vulnerability Database Jul 10, 2024
Published to the GitHub Advisory Database Jul 11, 2024
Last updated Jul 31, 2024

Severity

High

Weaknesses

CVE ID

CVE-2024-39560

GHSA ID

GHSA-gc6q-hh4v-5gvq

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.