CVE Vulnerabilities

CVE-2024-39550

Missing Release of Memory after Effective Lifetime

Published: Jul 11, 2024 | Modified: Jul 11, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps) to cause a slow memory leak, ultimately leading to a Denial of Service (DoS).

Memory can only be recovered by manually restarting rtlogd process.  The memory usage can be monitored using the below command.

    user@host> show system processes extensive | match rtlog 

This issue affects Junos OS on MX Series with SPC3 line card: 

  • from 21.2R3 before 21.2R3-S8, 
  • from 21.4R2 before 21.4R3-S6, 
  • from 22.1 before 22.1R3-S5, 
  • from 22.2 before 22.2R3-S3, 
  • from 22.3 before 22.3R3-S2, 
  • from 22.4 before 22.4R3-S1, 
  • from 23.2 before 23.2R2, 
  • from 23.4 before 23.4R2.

Weakness

The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.

Potential Mitigations

  • Choose a language or tool that provides automatic memory management, or makes manual memory management less error-prone.
  • For example, glibc in Linux provides protection against free of invalid pointers.
  • When using Xcode to target OS X or iOS, enable automatic reference counting (ARC) [REF-391].
  • To help correctly and consistently manage memory when programming in C++, consider using a smart pointer class such as std::auto_ptr (defined by ISO/IEC ISO/IEC 14882:2003), std::shared_ptr and std::unique_ptr (specified by an upcoming revision of the C++ standard, informally referred to as C++ 1x), or equivalent solutions such as Boost.

References