CVE-2021-0276
15.07.2021, 20:15
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | steel-belted_radius_carrier | 8.4.1 |
juniper | steel-belted_radius_carrier | 8.4.1:r13 |
juniper | steel-belted_radius_carrier | 8.5.0 |
juniper | steel-belted_radius_carrier | 8.5.0:r4 |
juniper | steel-belted_radius_carrier | 8.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.