Description
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.
Problem types
CWE-822 Untrusted Pointer Dereference
Product status
Any version before 22.4R3-S8
23.2 (semver) before 23.2R2-S5
23.4 (semver) before 23.4R2-S5
24.2 (semver) before 24.2R2-S2
24.4 (semver) before 24.4R2
Any version before 22.4R3-S8-EVO
23.2 (semver) before 23.2R2-S5-EVO
23.4 (semver) before 23.4R2-S6-EVO
24.2 (semver) before 24.2R2-S2-EVO
24.4 (semver) before 24.4R2-EVO
References
supportportal.juniper.net/
kb.juniper.net/JSA103148