CVE Vulnerabilities

CVE-2024-39529

Use of Externally-Controlled Format String

Published: Jul 11, 2024 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service.

This issue affects Junos OS:

  • All versions before 21.4R3-S6,
  • 22.2 versions before 22.2R3-S3,
  • 22.3 versions before 22.3R3-S3,
  • 22.4 versions before 22.4R3,
  • 23.2 versions before 23.2R2.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Junos Juniper * 21.4 (excluding)
Junos Juniper 21.4 (including) 21.4 (including)
Junos Juniper 21.4-r1 (including) 21.4-r1 (including)
Junos Juniper 21.4-r1-s1 (including) 21.4-r1-s1 (including)
Junos Juniper 21.4-r1-s2 (including) 21.4-r1-s2 (including)
Junos Juniper 21.4-r2 (including) 21.4-r2 (including)
Junos Juniper 21.4-r2-s1 (including) 21.4-r2-s1 (including)
Junos Juniper 21.4-r2-s2 (including) 21.4-r2-s2 (including)
Junos Juniper 21.4-r3 (including) 21.4-r3 (including)
Junos Juniper 21.4-r3-s1 (including) 21.4-r3-s1 (including)
Junos Juniper 21.4-r3-s2 (including) 21.4-r3-s2 (including)
Junos Juniper 21.4-r3-s3 (including) 21.4-r3-s3 (including)
Junos Juniper 21.4-r3-s4 (including) 21.4-r3-s4 (including)
Junos Juniper 21.4-r3-s5 (including) 21.4-r3-s5 (including)
Junos Juniper 22.2 (including) 22.2 (including)
Junos Juniper 22.2-r1 (including) 22.2-r1 (including)
Junos Juniper 22.2-r1-s1 (including) 22.2-r1-s1 (including)
Junos Juniper 22.2-r1-s2 (including) 22.2-r1-s2 (including)
Junos Juniper 22.2-r2 (including) 22.2-r2 (including)
Junos Juniper 22.2-r2-s1 (including) 22.2-r2-s1 (including)
Junos Juniper 22.2-r2-s2 (including) 22.2-r2-s2 (including)
Junos Juniper 22.2-r3 (including) 22.2-r3 (including)
Junos Juniper 22.2-r3-s1 (including) 22.2-r3-s1 (including)
Junos Juniper 22.2-r3-s2 (including) 22.2-r3-s2 (including)
Junos Juniper 22.3 (including) 22.3 (including)
Junos Juniper 22.3-r1 (including) 22.3-r1 (including)
Junos Juniper 22.3-r1-s1 (including) 22.3-r1-s1 (including)
Junos Juniper 22.3-r1-s2 (including) 22.3-r1-s2 (including)
Junos Juniper 22.3-r2 (including) 22.3-r2 (including)
Junos Juniper 22.3-r2-s1 (including) 22.3-r2-s1 (including)
Junos Juniper 22.3-r2-s2 (including) 22.3-r2-s2 (including)
Junos Juniper 22.3-r3 (including) 22.3-r3 (including)
Junos Juniper 22.3-r3-s1 (including) 22.3-r3-s1 (including)
Junos Juniper 22.3-r3-s2 (including) 22.3-r3-s2 (including)
Junos Juniper 22.4 (including) 22.4 (including)
Junos Juniper 22.4-r1 (including) 22.4-r1 (including)
Junos Juniper 22.4-r1-s1 (including) 22.4-r1-s1 (including)
Junos Juniper 22.4-r1-s2 (including) 22.4-r1-s2 (including)
Junos Juniper 22.4-r2 (including) 22.4-r2 (including)
Junos Juniper 22.4-r2-s1 (including) 22.4-r2-s1 (including)
Junos Juniper 22.4-r2-s2 (including) 22.4-r2-s2 (including)
Junos Juniper 23.2 (including) 23.2 (including)
Junos Juniper 23.2-r1 (including) 23.2-r1 (including)
Junos Juniper 23.2-r1-s1 (including) 23.2-r1-s1 (including)
Junos Juniper 23.2-r1-s2 (including) 23.2-r1-s2 (including)

Potential Mitigations

References