Loading HuntDB...

GHSA-79v4-xhfm-cr97

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS).

When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts.

Continuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices.

This issue affects:

 Juniper Networks Junos OS: 

* All versions before 21.4R3-S8, 
* from 22.2 before 22.2R3-S4, 
* from 22.4 before 22.4R3-S3, 
* from 23.2 before 23.2R2-S1, 
* from 23.4 before 23.4R1-S2, 23.4R2.

 Juniper Networks Junos OS Evolved: 

* All versions before 21.4R3-S8-EVO,
* from 22.2 before 22.2R3-S4-EVO,
* from 22.4 before 22.4R3-S3-EVO,
* from 23.2 before 23.2R2-S1-EVO,
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.

Related CVEs

Key Information

GHSA ID
GHSA-79v4-xhfm-cr97
Published
October 11, 2024 6:32 PM
Last Modified
October 17, 2024 6:31 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.