A Buffer Copy without Checking Size of Input...
High severity
Unreviewed
Published
Jul 11, 2024
to the GitHub Advisory Database
•
Updated Jul 31, 2024
Description
Published by the National Vulnerability Database
Jul 11, 2024
Published to the GitHub Advisory Database
Jul 11, 2024
Last updated
Jul 31, 2024
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue affects
Junos OS:
Junos OS Evolved: * All versions before 21.2R3-S8-EVO,
References