First published: Wed Feb 05 2025(Updated: )
This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS: * from 22.4 before 22.4R3-S4. Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | >=22.4<22.4R3-S4 | |
Juniper Networks Junos OS Evolved | >=22.4<22.4R3-S4-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS: 22.4R3-S4 and all subsequent releases. Junos OS Evolved: 22.4R3-S4-EVO and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39564 is considered a medium-severity vulnerability due to the potential for exploitation through a double-free condition.
To mitigate CVE-2024-39564, you should update to the latest version of Junos OS or Junos OS Evolved that addresses this vulnerability.
CVE-2024-39564 affects Junos OS versions from 22.4 to just before 22.4R3-S4.
Yes, Junos OS Evolved versions from 22.4 to just before 22.4R3-S4-EVO are affected by CVE-2024-39564.
CVE-2024-39564 is a double-free vulnerability specifically occurring in the routing process daemon (rpd) of Juniper Networks' products.