CVE-2024-39518
Severity CVSS v4.0:
HIGH
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
10/07/2024
Last modified:
01/03/2025
Description
A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service (DoS).<br />
<br />
When the device is subscribed to a specific subscription on Junos Telemetry Interface, a slow memory leak occurs and eventually all resources are consumed and the device becomes unresponsive. A manual reboot of the Line Card will be required to restore the device to its normal functioning. <br />
<br />
This issue is only seen when telemetry subscription is active.<br />
<br />
The Heap memory utilization can be monitored using the following command:<br />
> show system processes extensive<br />
<br />
The following command can be used to monitor the memory utilization of the specific sensor<br />
> show system info | match sensord<br />
PID NAME MEMORY PEAK MEMORY %CPU THREAD-COUNT CORE-AFFINITY UPTIME<br />
<br />
1986 sensord 877.57MB 877.57MB 2 4 0,2-15 7-21:41:32<br />
<br />
<br />
This issue affects Junos OS: <br />
<br />
<br />
<br />
* from 21.2R3-S5 before 21.2R3-S7, <br />
* from 21.4R3-S4 before 21.4R3-S6, <br />
* from 22.2R3 before 22.2R3-S4, <br />
* from 22.3R2 before 22.3R3-S2, <br />
* from 22.4R1 before 22.4R3, <br />
* from 23.2R1 before 23.2R2.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page