CVE-2021-31383
19.10.2021, 19:15
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1. Juniper Networks Junos OS Evolved 20.1 versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 19.2 |
juniper | junos | 19.2:r1 |
juniper | junos | 19.2:r1-s1 |
juniper | junos | 19.2:r1-s2 |
juniper | junos | 19.2:r1-s3 |
juniper | junos | 19.2:r1-s4 |
juniper | junos | 19.2:r1-s5 |
juniper | junos | 19.2:r1-s6 |
juniper | junos | 19.2:r2 |
juniper | junos | 19.2:r2-s1 |
juniper | junos | 19.2:r3 |
juniper | junos | 19.2:r3-s1 |
juniper | junos | 19.3 |
juniper | junos | 19.3:r1 |
juniper | junos | 19.3:r1-s1 |
juniper | junos | 19.3:r2 |
juniper | junos | 19.3:r2-s1 |
juniper | junos | 19.3:r2-s2 |
juniper | junos | 19.3:r2-s3 |
juniper | junos | 19.3:r2-s4 |
juniper | junos | 19.3:r2-s5 |
juniper | junos | 19.3:r3 |
juniper | junos | 19.3:r3-s1 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos | 19.4:r1-s2 |
juniper | junos | 19.4:r1-s3 |
juniper | junos | 19.4:r2 |
juniper | junos | 19.4:r2-s1 |
juniper | junos | 19.4:r2-s2 |
juniper | junos | 19.4:r2-s3 |
juniper | junos | 19.4:r3 |
juniper | junos | 19.4:r3-s1 |
juniper | junos | 19.4:r3-s2 |
juniper | junos | 20.1:r1 |
juniper | junos | 20.1:r1-s1 |
juniper | junos | 20.1:r1-s2 |
juniper | junos | 20.1:r1-s3 |
juniper | junos | 20.1:r1-s4 |
juniper | junos | 20.1:r2 |
juniper | junos | 20.1:r2-s1 |
juniper | junos | 20.2:r1 |
juniper | junos | 20.2:r1-s1 |
juniper | junos | 20.2:r1-s2 |
juniper | junos | 20.2:r1-s3 |
juniper | junos | 20.2:r2 |
juniper | junos | 20.2:r2-s1 |
juniper | junos | 20.2:r2-s2 |
juniper | junos | 20.3:r1 |
juniper | junos | 20.3:r1-s1 |
juniper | junos_os_evolved | 20.1 |
juniper | junos_os_evolved | 20.1:r1 |
juniper | junos_os_evolved | 20.1:r1-s1 |
juniper | junos_os_evolved | 20.1:r2 |
juniper | junos_os_evolved | 20.1:r2-s1 |
juniper | junos_os_evolved | 20.1:r2-s2 |
juniper | junos_os_evolved | 20.1:r2-s3 |
juniper | junos_os_evolved | 20.1:r2-s4 |
juniper | junos_os_evolved | 20.1:r2-s5 |
juniper | junos_os_evolved | 20.2 |
juniper | junos_os_evolved | 20.2:r1 |
juniper | junos_os_evolved | 20.2:r1-s1 |
juniper | junos_os_evolved | 20.2:r2 |
juniper | junos_os_evolved | 20.2:r2-s1 |
juniper | junos_os_evolved | 20.3 |
juniper | junos_os_evolved | 20.3:r1 |
juniper | junos_os_evolved | 20.3:r1-s1 |
juniper | junos_os_evolved | 20.3:r1-s2 |
juniper | junos_os_evolved | 20.3:r1-s3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.