First published: Wed Jul 10 2024(Updated: )
An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS). Certain MAC table updates cause a small amount of memory to leak. Once memory utilization reaches its limit, the issue will result in a system crash and restart. To identify the issue, execute the CLI command: user@device> show platform application-info allocations app l2ald-agent EVL Object Allocation Statistics: Node Application Context Name Live Allocs Fails Guids re0 l2ald-agent net::juniper::rtnh::L2Rtinfo 1069096 1069302 0 1069302 re0 l2ald-agent net::juniper::rtnh::NHOpaqueTlv 114 195 0 195 This issue affects Junos OS Evolved: * All versions before 21.4R3-S8-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S3-EVO, * from 22.4-EVO before 22.4R3-EVO, * from 23.2-EVO before 23.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <21.4R3-S8-EVO>=undefined>=undefined>=undefined>=undefined | |
Juniper JUNOS | <21.4 | |
Juniper JUNOS | =21.4 | |
Juniper JUNOS | =21.4-r1 | |
Juniper JUNOS | =21.4-r1-s1 | |
Juniper JUNOS | =21.4-r1-s2 | |
Juniper JUNOS | =21.4-r2 | |
Juniper JUNOS | =21.4-r2-s1 | |
Juniper JUNOS | =21.4-r2-s2 | |
Juniper JUNOS | =21.4-r3 | |
Juniper JUNOS | =21.4-r3-s1 | |
Juniper JUNOS | =21.4-r3-s2 | |
Juniper JUNOS | =21.4-r3-s3 | |
Juniper JUNOS | =21.4-r3-s4 | |
Juniper JUNOS | =21.4-r3-s5 | |
Juniper JUNOS | =21.4-r3-s6 | |
Juniper JUNOS | =21.4-r3-s7 | |
Juniper JUNOS | =22.2 | |
Juniper JUNOS | =22.2-r1 | |
Juniper JUNOS | =22.2-r1-s1 | |
Juniper JUNOS | =22.2-r1-s2 | |
Juniper JUNOS | =22.2-r2 | |
Juniper JUNOS | =22.2-r2-s1 | |
Juniper JUNOS | =22.2-r2-s2 | |
Juniper JUNOS | =22.2-r3 | |
Juniper JUNOS | =22.2-r3-s1 | |
Juniper JUNOS | =22.2-r3-s2 | |
Juniper JUNOS | =22.2-r3-s3 | |
Juniper JUNOS | =22.3 | |
Juniper JUNOS | =22.3-r1 | |
Juniper JUNOS | =22.3-r1-s1 | |
Juniper JUNOS | =22.3-r1-s2 | |
Juniper JUNOS | =22.3-r2 | |
Juniper JUNOS | =22.3-r2-s1 | |
Juniper JUNOS | =22.3-r2-s2 | |
Juniper JUNOS | =22.3-r3 | |
Juniper JUNOS | =22.3-r3-s1 | |
Juniper JUNOS | =22.3-r3-s2 | |
Juniper JUNOS | =22.4 | |
Juniper JUNOS | =22.4-r1 | |
Juniper JUNOS | =22.4-r1-s1 | |
Juniper JUNOS | =22.4-r1-s2 | |
Juniper JUNOS | =22.4-r2 | |
Juniper JUNOS | =22.4-r2-s1 | |
Juniper JUNOS | =22.4-r2-s2 | |
Juniper JUNOS | =23.2 | |
Juniper JUNOS | =23.2-r1 | |
Juniper JUNOS | =23.2-r1-s1 | |
Juniper JUNOS | =23.2-r1-s2 |
The following software releases have been updated to resolve this specific issue: 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39557 is considered a critical vulnerability due to its potential to cause a complete system crash.
To fix CVE-2024-39557, update Junos OS Evolved to a patched version that addresses the uncontrolled resource consumption issue.
CVE-2024-39557 can be exploited by an unauthenticated, adjacent attacker.
Exploitation of CVE-2024-39557 can lead to a memory leak, exhausting system memory, resulting in a system crash.
CVE-2024-39557 affects Junos OS Evolved versions up to and including 21.4R3-S8-EVO.