CVE-2021-31383

In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1. Juniper Networks Junos OS Evolved 20.1 versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
juniperjunos
19.2
juniperjunos
19.2:r1
juniperjunos
19.2:r1-s1
juniperjunos
19.2:r1-s2
juniperjunos
19.2:r1-s3
juniperjunos
19.2:r1-s4
juniperjunos
19.2:r1-s5
juniperjunos
19.2:r1-s6
juniperjunos
19.2:r2
juniperjunos
19.2:r2-s1
juniperjunos
19.2:r3
juniperjunos
19.2:r3-s1
juniperjunos
19.3
juniperjunos
19.3:r1
juniperjunos
19.3:r1-s1
juniperjunos
19.3:r2
juniperjunos
19.3:r2-s1
juniperjunos
19.3:r2-s2
juniperjunos
19.3:r2-s3
juniperjunos
19.3:r2-s4
juniperjunos
19.3:r2-s5
juniperjunos
19.3:r3
juniperjunos
19.3:r3-s1
juniperjunos
19.4:r1
juniperjunos
19.4:r1-s1
juniperjunos
19.4:r1-s2
juniperjunos
19.4:r1-s3
juniperjunos
19.4:r2
juniperjunos
19.4:r2-s1
juniperjunos
19.4:r2-s2
juniperjunos
19.4:r2-s3
juniperjunos
19.4:r3
juniperjunos
19.4:r3-s1
juniperjunos
19.4:r3-s2
juniperjunos
20.1:r1
juniperjunos
20.1:r1-s1
juniperjunos
20.1:r1-s2
juniperjunos
20.1:r1-s3
juniperjunos
20.1:r1-s4
juniperjunos
20.1:r2
juniperjunos
20.1:r2-s1
juniperjunos
20.2:r1
juniperjunos
20.2:r1-s1
juniperjunos
20.2:r1-s2
juniperjunos
20.2:r1-s3
juniperjunos
20.2:r2
juniperjunos
20.2:r2-s1
juniperjunos
20.2:r2-s2
juniperjunos
20.3:r1
juniperjunos
20.3:r1-s1
juniperjunos_os_evolved
20.1
juniperjunos_os_evolved
20.1:r1
juniperjunos_os_evolved
20.1:r1-s1
juniperjunos_os_evolved
20.1:r2
juniperjunos_os_evolved
20.1:r2-s1
juniperjunos_os_evolved
20.1:r2-s2
juniperjunos_os_evolved
20.1:r2-s3
juniperjunos_os_evolved
20.1:r2-s4
juniperjunos_os_evolved
20.1:r2-s5
juniperjunos_os_evolved
20.2
juniperjunos_os_evolved
20.2:r1
juniperjunos_os_evolved
20.2:r1-s1
juniperjunos_os_evolved
20.2:r2
juniperjunos_os_evolved
20.2:r2-s1
juniperjunos_os_evolved
20.3
juniperjunos_os_evolved
20.3:r1
juniperjunos_os_evolved
20.3:r1-s1
juniperjunos_os_evolved
20.3:r1-s2
juniperjunos_os_evolved
20.3:r1-s3
𝑥
= Vulnerable software versions