CVE-2022-22208
18.10.2022, 03:15
A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free of a memory location that was assigned to another object can occur, which will lead to an rpd crash. This is a race condition that is outside of the attacker's control and cannot be deterministically exploited. Continued flapping of BGP sessions can create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: All versions prior to 18.4R2-S9, 18.4R3-S11; 19.1 versions prior to 19.1R3-S8; 19.2 version 19.2R1 and later versions; 19.3 versions prior to 19.3R3-S5; 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R2-S1, 21.2R3. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S4-EVO; 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 18.4 |
juniper | junos | 18.4 |
juniper | junos | 18.4:r1 |
juniper | junos | 18.4:r1-s1 |
juniper | junos | 18.4:r1-s2 |
juniper | junos | 18.4:r1-s3 |
juniper | junos | 18.4:r1-s4 |
juniper | junos | 18.4:r1-s5 |
juniper | junos | 18.4:r1-s6 |
juniper | junos | 18.4:r1-s7 |
juniper | junos | 18.4:r2 |
juniper | junos | 18.4:r2-s1 |
juniper | junos | 18.4:r2-s10 |
juniper | junos | 18.4:r2-s2 |
juniper | junos | 18.4:r2-s3 |
juniper | junos | 18.4:r2-s4 |
juniper | junos | 18.4:r2-s5 |
juniper | junos | 18.4:r2-s6 |
juniper | junos | 18.4:r2-s7 |
juniper | junos | 18.4:r2-s8 |
juniper | junos | 18.4:r3-s11 |
juniper | junos | 19.1 |
juniper | junos | 19.1:r1 |
juniper | junos | 19.1:r1-s1 |
juniper | junos | 19.1:r1-s2 |
juniper | junos | 19.1:r1-s3 |
juniper | junos | 19.1:r1-s4 |
juniper | junos | 19.1:r1-s5 |
juniper | junos | 19.1:r1-s6 |
juniper | junos | 19.1:r2 |
juniper | junos | 19.1:r2-s1 |
juniper | junos | 19.1:r2-s2 |
juniper | junos | 19.1:r2-s3 |
juniper | junos | 19.1:r3 |
juniper | junos | 19.1:r3-s1 |
juniper | junos | 19.1:r3-s2 |
juniper | junos | 19.1:r3-s3 |
juniper | junos | 19.1:r3-s4 |
juniper | junos | 19.1:r3-s5 |
juniper | junos | 19.1:r3-s6 |
juniper | junos | 19.1:r3-s7 |
juniper | junos | 19.2 |
juniper | junos | 19.2:r1 |
juniper | junos | 19.3 |
juniper | junos | 19.3:r1 |
juniper | junos | 19.3:r1-s1 |
juniper | junos | 19.3:r2 |
juniper | junos | 19.3:r2-s1 |
juniper | junos | 19.3:r2-s2 |
juniper | junos | 19.3:r2-s3 |
juniper | junos | 19.3:r2-s4 |
juniper | junos | 19.3:r2-s5 |
juniper | junos | 19.3:r2-s6 |
juniper | junos | 19.3:r3 |
juniper | junos | 19.3:r3-s1 |
juniper | junos | 19.3:r3-s2 |
juniper | junos | 19.3:r3-s3 |
juniper | junos | 19.3:r3-s4 |
juniper | junos | 19.4 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos | 19.4:r1-s2 |
juniper | junos | 19.4:r1-s3 |
juniper | junos | 19.4:r1-s4 |
juniper | junos | 19.4:r2 |
juniper | junos | 19.4:r2-s1 |
juniper | junos | 19.4:r2-s2 |
juniper | junos | 19.4:r2-s3 |
juniper | junos | 19.4:r2-s4 |
juniper | junos | 19.4:r2-s5 |
juniper | junos | 19.4:r3-s6 |
juniper | junos | 20.1 |
juniper | junos | 20.1:r1 |
juniper | junos | 20.2 |
juniper | junos | 20.2:r1 |
juniper | junos | 20.2:r1-s1 |
juniper | junos | 20.2:r1-s2 |
juniper | junos | 20.2:r1-s3 |
juniper | junos | 20.2:r2 |
juniper | junos | 20.2:r2-s1 |
juniper | junos | 20.2:r2-s2 |
juniper | junos | 20.2:r2-s3 |
juniper | junos | 20.2:r3 |
juniper | junos | 20.2:r3-s1 |
juniper | junos | 20.2:r3-s2 |
juniper | junos | 20.3 |
juniper | junos | 20.3:r1 |
juniper | junos | 20.3:r1-s1 |
juniper | junos | 20.3:r1-s2 |
juniper | junos | 20.3:r2 |
juniper | junos | 20.3:r2-s1 |
juniper | junos | 20.3:r3 |
juniper | junos | 20.3:r3-s1 |
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.1:r3-s1 |
juniper | junos | 21.1:r3-s2 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r3 |
juniper | junos_os_evolved | 21.1 |
juniper | junos_os_evolved | 21.1:r1 |
juniper | junos_os_evolved | 21.1:r1-s1 |
juniper | junos_os_evolved | 21.1:r2 |
juniper | junos_os_evolved | 21.1:r3 |
juniper | junos_os_evolved | 21.1:r3-s1 |
juniper | junos_os_evolved | 21.2 |
juniper | junos_os_evolved | 21.2:r1 |
juniper | junos_os_evolved | 21.2:r1-s1 |
juniper | junos_os_evolved | 21.2:r1-s2 |
juniper | junos_os_evolved | 21.2:r2 |
juniper | junos_os_evolved | 21.2:r2-s1 |
juniper | junos_os_evolved | 21.2:r2-s2 |
juniper | junos_os_evolved | 21.3 |
juniper | junos_os_evolved | 21.3:r1 |
juniper | junos_os_evolved | 21.3:r1-s1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-416 - Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.