CVE-2024-39564
EUVD-2024-3835205.02.2025, 16:15
This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS: * from 22.4 before 22.4R3-S4. Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 𝑥 < 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2:r1 |
| juniper | junos | 21.2:r1-s1 |
| juniper | junos | 21.2:r1-s2 |
| juniper | junos | 21.2:r2 |
| juniper | junos | 21.2:r2-s1 |
| juniper | junos | 21.2:r2-s2 |
| juniper | junos | 21.2:r3 |
| juniper | junos | 21.2:r3-s1 |
| juniper | junos | 21.2:r3-s2 |
| juniper | junos | 21.2:r3-s3 |
| juniper | junos | 21.2:r3-s4 |
| juniper | junos | 21.2:r3-s5 |
| juniper | junos | 21.2:r3-s6 |
| juniper | junos | 21.2:r3-s7 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4:r1 |
| juniper | junos | 21.4:r1-s1 |
| juniper | junos | 21.4:r1-s2 |
| juniper | junos | 21.4:r2 |
| juniper | junos | 21.4:r2-s1 |
| juniper | junos | 21.4:r2-s2 |
| juniper | junos | 21.4:r3 |
| juniper | junos | 21.4:r3-s1 |
| juniper | junos | 21.4:r3-s2 |
| juniper | junos | 21.4:r3-s3 |
| juniper | junos | 21.4:r3-s4 |
| juniper | junos | 21.4:r3-s5 |
| juniper | junos | 21.4:r3-s6 |
| juniper | junos | 21.4:r3-s7 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2:r1 |
| juniper | junos | 22.2:r1-s1 |
| juniper | junos | 22.2:r1-s2 |
| juniper | junos | 22.2:r2 |
| juniper | junos | 22.2:r2-s1 |
| juniper | junos | 22.2:r2-s2 |
| juniper | junos | 22.2:r3 |
| juniper | junos | 22.2:r3-s1 |
| juniper | junos | 22.2:r3-s2 |
| juniper | junos | 22.2:r3-s3 |
| juniper | junos | 22.2:r3-s4 |
| juniper | junos | 22.3 |
| juniper | junos | 22.3:r1 |
| juniper | junos | 22.3:r1-s1 |
| juniper | junos | 22.3:r1-s2 |
| juniper | junos | 22.3:r2 |
| juniper | junos | 22.3:r2-s1 |
| juniper | junos | 22.3:r2-s2 |
| juniper | junos | 22.3:r3 |
| juniper | junos | 22.3:r3-s1 |
| juniper | junos | 22.3:r3-s2 |
| juniper | junos | 22.3:r3-s3 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4:r1 |
| juniper | junos | 22.4:r1-s1 |
| juniper | junos | 22.4:r1-s2 |
| juniper | junos | 22.4:r2 |
| juniper | junos | 22.4:r2-s1 |
| juniper | junos | 22.4:r2-s2 |
| juniper | junos | 22.4:r3 |
| juniper | junos | 22.4:r3-s1 |
| juniper | junos | 22.4:r3-s2 |
| juniper | junos | 22.4:r3-s3 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2:r1 |
| juniper | junos | 23.2:r1-s1 |
| juniper | junos | 23.2:r1-s2 |
| juniper | junos | 23.2:r2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4:r1 |
| juniper | junos | 23.4:r1-s1 |
| juniper | junos | 23.4:r2 |
| juniper | junos_os_evolved | 𝑥 < 21.2 |
| juniper | junos_os_evolved | 21.2 |
| juniper | junos_os_evolved | 21.2:r1 |
| juniper | junos_os_evolved | 21.2:r1-s1 |
| juniper | junos_os_evolved | 21.2:r1-s2 |
| juniper | junos_os_evolved | 21.2:r2 |
| juniper | junos_os_evolved | 21.2:r2-s1 |
| juniper | junos_os_evolved | 21.2:r2-s2 |
| juniper | junos_os_evolved | 21.2:r3 |
| juniper | junos_os_evolved | 21.2:r3-s1 |
| juniper | junos_os_evolved | 21.2:r3-s2 |
| juniper | junos_os_evolved | 21.2:r3-s3 |
| juniper | junos_os_evolved | 21.2:r3-s4 |
| juniper | junos_os_evolved | 21.2:r3-s5 |
| juniper | junos_os_evolved | 21.2:r3-s6 |
| juniper | junos_os_evolved | 21.2:r3-s7 |
| juniper | junos_os_evolved | 21.4 |
| juniper | junos_os_evolved | 21.4:r1 |
| juniper | junos_os_evolved | 21.4:r1-s1 |
| juniper | junos_os_evolved | 21.4:r1-s2 |
| juniper | junos_os_evolved | 21.4:r2 |
| juniper | junos_os_evolved | 21.4:r2-s1 |
| juniper | junos_os_evolved | 21.4:r2-s2 |
| juniper | junos_os_evolved | 21.4:r3 |
| juniper | junos_os_evolved | 21.4:r3-s1 |
| juniper | junos_os_evolved | 21.4:r3-s2 |
| juniper | junos_os_evolved | 21.4:r3-s3 |
| juniper | junos_os_evolved | 21.4:r3-s4 |
| juniper | junos_os_evolved | 21.4:r3-s5 |
| juniper | junos_os_evolved | 21.4:r3-s6 |
| juniper | junos_os_evolved | 21.4:r3-s7 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2:r1 |
| juniper | junos_os_evolved | 22.2:r1-s1 |
| juniper | junos_os_evolved | 22.2:r1-s2 |
| juniper | junos_os_evolved | 22.2:r2 |
| juniper | junos_os_evolved | 22.2:r2-s1 |
| juniper | junos_os_evolved | 22.2:r2-s2 |
| juniper | junos_os_evolved | 22.2:r3 |
| juniper | junos_os_evolved | 22.2:r3-s1 |
| juniper | junos_os_evolved | 22.2:r3-s2 |
| juniper | junos_os_evolved | 22.2:r3-s3 |
| juniper | junos_os_evolved | 22.2:r3-s4 |
| juniper | junos_os_evolved | 22.3 |
| juniper | junos_os_evolved | 22.3:r1 |
| juniper | junos_os_evolved | 22.3:r1-s1 |
| juniper | junos_os_evolved | 22.3:r1-s2 |
| juniper | junos_os_evolved | 22.3:r2 |
| juniper | junos_os_evolved | 22.3:r2-s1 |
| juniper | junos_os_evolved | 22.3:r2-s2 |
| juniper | junos_os_evolved | 22.3:r3 |
| juniper | junos_os_evolved | 22.3:r3-s1 |
| juniper | junos_os_evolved | 22.3:r3-s2 |
| juniper | junos_os_evolved | 22.3:r3-s3 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4:r1 |
| juniper | junos_os_evolved | 22.4:r1-s1 |
| juniper | junos_os_evolved | 22.4:r1-s2 |
| juniper | junos_os_evolved | 22.4:r2 |
| juniper | junos_os_evolved | 22.4:r2-s1 |
| juniper | junos_os_evolved | 22.4:r2-s2 |
| juniper | junos_os_evolved | 22.4:r3 |
| juniper | junos_os_evolved | 22.4:r3-s1 |
| juniper | junos_os_evolved | 22.4:r3-s2 |
| juniper | junos_os_evolved | 22.4:r3-s3 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2:r1 |
| juniper | junos_os_evolved | 23.2:r1-s1 |
| juniper | junos_os_evolved | 23.2:r1-s2 |
| juniper | junos_os_evolved | 23.2:r2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4:r1 |
| juniper | junos_os_evolved | 23.4:r1-s1 |
| juniper | junos_os_evolved | 23.4:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration