In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2828 In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 19.4R2-S2-EVO, 20.1R1-S2-EVO, 20.1R2-S1-EVO, 20.2R1-EVO and all subsequent releases.


Workaround

There are no available workarounds for this issue.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-17T03:32:29.054Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2021-0209

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-15T18:15:15.027

Modified: 2024-11-21T05:42:12.620

Link: CVE-2021-0209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.