CVE-2024-39556
10.07.2024, 23:15
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the local user's command interpreter, or potentially trigger a stack-based buffer overflow. This issue affects: Junos OS: * All versions before 21.4R3-S7, * from 22.1 before 22.1R3-S6, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2; Junos OS Evolved: * All versions before 21.4R3-S7-EVO, * from 22.1-EVO before 22.1R3-S6-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S3-EVO, * from 22.4-EVO before 22.4R3-S2-EVO, * from 23.2-EVO before 23.2R2-EVO, * from 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos_os_evolved | 𝑥 < 21.4r3-s7-evo |
juniper | junos_os | 𝑥 < 21.4r3-s7 |
juniper | junos_os | 22.1r3-s6 < 𝑥 < 22.1r3-s6 |
juniper | junos_os | 22.2r3-s4 < 𝑥 < 22.2r3-s4 |
juniper | junos_os | 22.3r3-s3 < 𝑥 < 22.3r3-s3 |
juniper | junos_os | 22.4r3-s2 < 𝑥 < 22.4r3-s2 |
juniper | junos_os | 23.2r2 < 𝑥 < 23.2r2 |
juniper | junos_os | 23.4r1-s1 < 𝑥 < 23.4r1-s1 |
juniper | junos_os | 23.4r2 < 𝑥 < 23.4r2 |
juniper | junos | 𝑥 < 21.4 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 21.4:r2-s2 |
juniper | junos | 21.4:r3 |
juniper | junos | 21.4:r3-s1 |
juniper | junos | 21.4:r3-s2 |
juniper | junos | 21.4:r3-s3 |
juniper | junos | 21.4:r3-s4 |
juniper | junos | 21.4:r3-s5 |
juniper | junos | 21.4:r3-s6 |
juniper | junos | 22.1 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
juniper | junos | 22.1:r1-s2 |
juniper | junos | 22.1:r2 |
juniper | junos | 22.1:r2-s1 |
juniper | junos | 22.1:r2-s2 |
juniper | junos | 22.1:r3 |
juniper | junos | 22.1:r3-s1 |
juniper | junos | 22.1:r3-s2 |
juniper | junos | 22.1:r3-s3 |
juniper | junos | 22.1:r3-s4 |
juniper | junos | 22.1:r3-s5 |
juniper | junos | 22.2 |
juniper | junos | 22.2:r1 |
juniper | junos | 22.2:r1-s1 |
juniper | junos | 22.2:r1-s2 |
juniper | junos | 22.2:r2 |
juniper | junos | 22.2:r2-s1 |
juniper | junos | 22.2:r2-s2 |
juniper | junos | 22.2:r3 |
juniper | junos | 22.2:r3-s1 |
juniper | junos | 22.2:r3-s2 |
juniper | junos | 22.2:r3-s3 |
juniper | junos | 22.3 |
juniper | junos | 22.3:r1 |
juniper | junos | 22.3:r1-s1 |
juniper | junos | 22.3:r1-s2 |
juniper | junos | 22.3:r2 |
juniper | junos | 22.3:r2-s1 |
juniper | junos | 22.3:r2-s2 |
juniper | junos | 22.3:r3 |
juniper | junos | 22.3:r3-s1 |
juniper | junos | 22.3:r3-s2 |
juniper | junos | 22.4 |
juniper | junos | 22.4:r1 |
juniper | junos | 22.4:r1-s1 |
juniper | junos | 22.4:r1-s2 |
juniper | junos | 22.4:r2 |
juniper | junos | 22.4:r2-s1 |
juniper | junos | 22.4:r2-s2 |
juniper | junos | 22.4:r3 |
juniper | junos | 22.4:r3-s1 |
juniper | junos | 23.2 |
juniper | junos | 23.2:r1 |
juniper | junos | 23.2:r1-s1 |
juniper | junos | 23.2:r1-s2 |
juniper | junos | 23.4 |
juniper | junos | 23.4:r1 |
juniper | junos_os_evolved | 𝑥 < 21.4 |
juniper | junos_os_evolved | 21.4 |
juniper | junos_os_evolved | 21.4:r1 |
juniper | junos_os_evolved | 21.4:r1-s1 |
juniper | junos_os_evolved | 21.4:r1-s2 |
juniper | junos_os_evolved | 21.4:r2 |
juniper | junos_os_evolved | 21.4:r2-s1 |
juniper | junos_os_evolved | 21.4:r2-s2 |
juniper | junos_os_evolved | 21.4:r3 |
juniper | junos_os_evolved | 21.4:r3-s1 |
juniper | junos_os_evolved | 21.4:r3-s2 |
juniper | junos_os_evolved | 21.4:r3-s3 |
juniper | junos_os_evolved | 21.4:r3-s4 |
juniper | junos_os_evolved | 21.4:r3-s5 |
juniper | junos_os_evolved | 21.4:r3-s6 |
juniper | junos_os_evolved | 22.1 |
juniper | junos_os_evolved | 22.1:r1 |
juniper | junos_os_evolved | 22.1:r1-s1 |
juniper | junos_os_evolved | 22.1:r1-s2 |
juniper | junos_os_evolved | 22.1:r2 |
juniper | junos_os_evolved | 22.1:r2-s1 |
juniper | junos_os_evolved | 22.1:r3 |
juniper | junos_os_evolved | 22.1:r3-s1 |
juniper | junos_os_evolved | 22.1:r3-s2 |
juniper | junos_os_evolved | 22.1:r3-s3 |
juniper | junos_os_evolved | 22.1:r3-s4 |
juniper | junos_os_evolved | 22.1:r3-s5 |
juniper | junos_os_evolved | 22.2 |
juniper | junos_os_evolved | 22.2:r1 |
juniper | junos_os_evolved | 22.2:r1-s1 |
juniper | junos_os_evolved | 22.2:r1-s2 |
juniper | junos_os_evolved | 22.2:r2 |
juniper | junos_os_evolved | 22.2:r2-s1 |
juniper | junos_os_evolved | 22.2:r2-s2 |
juniper | junos_os_evolved | 22.2:r3 |
juniper | junos_os_evolved | 22.2:r3-s1 |
juniper | junos_os_evolved | 22.2:r3-s2 |
juniper | junos_os_evolved | 22.2:r3-s3 |
juniper | junos_os_evolved | 22.3 |
juniper | junos_os_evolved | 22.3:r1 |
juniper | junos_os_evolved | 22.3:r1-s1 |
juniper | junos_os_evolved | 22.3:r1-s2 |
juniper | junos_os_evolved | 22.3:r2 |
juniper | junos_os_evolved | 22.3:r2-s1 |
juniper | junos_os_evolved | 22.3:r2-s2 |
juniper | junos_os_evolved | 22.3:r3 |
juniper | junos_os_evolved | 22.3:r3-s1 |
juniper | junos_os_evolved | 22.3:r3-s2 |
juniper | junos_os_evolved | 22.4 |
juniper | junos_os_evolved | 22.4:r1 |
juniper | junos_os_evolved | 22.4:r1-s1 |
juniper | junos_os_evolved | 22.4:r1-s2 |
juniper | junos_os_evolved | 22.4:r2 |
juniper | junos_os_evolved | 22.4:r2-s1 |
juniper | junos_os_evolved | 22.4:r2-s2 |
juniper | junos_os_evolved | 22.4:r3 |
juniper | junos_os_evolved | 22.4:r3-s1 |
juniper | junos_os_evolved | 23.2 |
juniper | junos_os_evolved | 23.2:r1 |
juniper | junos_os_evolved | 23.2:r1-s1 |
juniper | junos_os_evolved | 23.2:r1-s2 |
juniper | junos_os_evolved | 23.4 |
juniper | junos_os_evolved | 23.4:r1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.