Memory Leak in rpd Causes DoS in Junos OS <21.2R3, 21.4, 22.2, 23.4
CVE-2024-39549 Published on July 11, 2024
Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak
A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not properly freed in all circumstances, leading to a Denial of Service (DoS).
Consumed memory can be freed by manually restarting Routing Protocol Daemon (rpd).
Memory utilization could be monitored by:
user@host> show system memory or show system monitor memory status
This issue affects:
Junos OS: * All versions before 21.2R3-S8,
* from 21.4 before 21.4R3-S8,
* from 22.2 before 22.2R3-S4,
* from 22.3 before 22.3R3-S3,
* from 22.4 before 22.4R3-S3,
* from 23.2 before 23.2R2-S1,
* from 23.4 before 23.4R1-S2, 23.4R2.
Junos OS Evolved:
* All versions before 21.2R3-S8-EVO,
* from 21.4 before 21.4R3-S8-EVO,
* from 22.2 before 22.2R3-S4-EVO,
* from 22.3 before 22.3R3-S3-EVO,
* from 22.4 before 22.4R3-S3-EVO,
* from 23.2 before 23.2R2-S1-EVO,
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.
Vulnerability Analysis
CVE-2024-39549 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a Memory Leak Vulnerability?
The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. This is often triggered by improper handling of malformed data or unexpectedly interrupted sessions. In some languages, developers are responsible for tracking memory allocation and releasing the memory. If there are no more pointers or references to the memory, then it can no longer be tracked and identified for release.
CVE-2024-39549 has been classified to as a Memory Leak vulnerability or weakness.
Products Associated with CVE-2024-39549
stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos or Juniper Networks Junos Os Evolved. Just hit a watch button to start following.
Affected Versions
Juniper Networks Junos OS:- Before 21.2R3-S8 is affected.
- Version 21.4 and below 21.4R3-S8 is affected.
- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3 is affected.
- Version 22.4 and below 22.4R3-S3 is affected.
- Version 23.2 and below 23.2R2-S1 is affected.
- Version 23.4 and below 23.4R1-S2, 23.4R2 is affected.
- Before 21.2R3-S8-EVO is affected.
- Version 21.4 and below 21.4R3-S8-EVO is affected.
- Version 22.2 and below 22.2R3-S4-EVO is affected.
- Version 22.3 and below 22.3R3-S3-EVO is affected.
- Version 22.4 and below 22.4R3-S3-EVO is affected.
- Version 23.2 and below 23.2R2-S1-EVO is affected.
- Version 23.4 and below 23.4R1-S2-EVO, 23.4R2-EVO is affected.
- Before 21.2R3-S8 is affected.
- Version 21.4 and below 21.4R3-S8 is affected.
- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3 is affected.
- Version 22.4 and below 22.4R3-S3 is affected.
- Version 23.2 and below 23.2R2-S1 is affected.
- Version 23.4 and below 23.4R1-S2 is affected.
- Version 23.4 and below 23.4R2 is affected.
- Version 24.2 and below 24.2R2 is affected.
- Before 21.2R3-S8-EVO is affected.
- Version 21.4 and below 21.4R3-S8-EVO is affected.
- Version 22.2 and below 22.2R3-S4-EVO is affected.
- Version 22.3 and below 22.3R3-S3-EVO is affected.
- Version 22.4 and below 22.4R3-S3-EVO is affected.
- Version 23.2 and below 23.2R2-S1-EVO is affected.
- Version 23.4 and below 23.4R1-S2-EVO is affected.
- Version 23.4 and below 23.4R2-EVO is affected.
- Version 24.2 and below 24.2R2-EVO is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.