Lucene search

K
nvd[email protected]NVD:CVE-2021-31383
HistoryOct 19, 2021 - 7:15 p.m.

CVE-2021-31383

2021-10-1919:15:11
CWE-121
CWE-787
web.nvd.nist.gov
7
stack-based buffer overflow
point to multipoint
rpd crash
network attacker
dos
junos os
junos os evolved

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.7%

In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1. Juniper Networks Junos OS Evolved 20.1 versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.

Affected configurations

Nvd
Node
juniperjunosMatch19.2-
OR
juniperjunosMatch19.2r1
OR
juniperjunosMatch19.2r1-s1
OR
juniperjunosMatch19.2r1-s2
OR
juniperjunosMatch19.2r1-s3
OR
juniperjunosMatch19.2r1-s4
OR
juniperjunosMatch19.2r1-s5
OR
juniperjunosMatch19.2r1-s6
OR
juniperjunosMatch19.2r2
OR
juniperjunosMatch19.2r2-s1
OR
juniperjunosMatch19.2r3
OR
juniperjunosMatch19.2r3-s1
OR
juniperjunosMatch19.3-
OR
juniperjunosMatch19.3r1
OR
juniperjunosMatch19.3r1-s1
OR
juniperjunosMatch19.3r2
OR
juniperjunosMatch19.3r2-s1
OR
juniperjunosMatch19.3r2-s2
OR
juniperjunosMatch19.3r2-s3
OR
juniperjunosMatch19.3r2-s4
OR
juniperjunosMatch19.3r2-s5
OR
juniperjunosMatch19.3r3
OR
juniperjunosMatch19.3r3-s1
OR
juniperjunosMatch19.4r1
OR
juniperjunosMatch19.4r1-s1
OR
juniperjunosMatch19.4r1-s2
OR
juniperjunosMatch19.4r1-s3
OR
juniperjunosMatch19.4r2
OR
juniperjunosMatch19.4r2-s1
OR
juniperjunosMatch19.4r2-s2
OR
juniperjunosMatch19.4r2-s3
OR
juniperjunosMatch19.4r3
OR
juniperjunosMatch19.4r3-s1
OR
juniperjunosMatch19.4r3-s2
OR
juniperjunosMatch20.1r1
OR
juniperjunosMatch20.1r1-s1
OR
juniperjunosMatch20.1r1-s2
OR
juniperjunosMatch20.1r1-s3
OR
juniperjunosMatch20.1r1-s4
OR
juniperjunosMatch20.1r2
OR
juniperjunosMatch20.1r2-s1
OR
juniperjunosMatch20.2r1
OR
juniperjunosMatch20.2r1-s1
OR
juniperjunosMatch20.2r1-s2
OR
juniperjunosMatch20.2r1-s3
OR
juniperjunosMatch20.2r2
OR
juniperjunosMatch20.2r2-s1
OR
juniperjunosMatch20.2r2-s2
OR
juniperjunosMatch20.3r1
OR
juniperjunosMatch20.3r1-s1
OR
juniperjunos_os_evolvedMatch20.1-
OR
juniperjunos_os_evolvedMatch20.1r1
OR
juniperjunos_os_evolvedMatch20.1r1-s1
OR
juniperjunos_os_evolvedMatch20.1r2
OR
juniperjunos_os_evolvedMatch20.1r2-s1
OR
juniperjunos_os_evolvedMatch20.1r2-s2
OR
juniperjunos_os_evolvedMatch20.1r2-s3
OR
juniperjunos_os_evolvedMatch20.1r2-s4
OR
juniperjunos_os_evolvedMatch20.1r2-s5
OR
juniperjunos_os_evolvedMatch20.2-
OR
juniperjunos_os_evolvedMatch20.2r1
OR
juniperjunos_os_evolvedMatch20.2r1-s1
OR
juniperjunos_os_evolvedMatch20.2r2
OR
juniperjunos_os_evolvedMatch20.2r2-s1
OR
juniperjunos_os_evolvedMatch20.3-
OR
juniperjunos_os_evolvedMatch20.3r1
OR
juniperjunos_os_evolvedMatch20.3r1-s1
OR
juniperjunos_os_evolvedMatch20.3r1-s2
OR
juniperjunos_os_evolvedMatch20.3r1-s3
VendorProductVersionCPE
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*
juniperjunos19.2cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*
Rows per page:
1-10 of 691

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.7%

Related for NVD:CVE-2021-31383