A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA11180 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2021-07-15T20:00:45.706473Z
Updated: 2024-09-16T19:00:01.867Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2021-0276
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-07-15T20:15:09.290
Modified: 2024-11-21T05:42:22.867
Link: CVE-2021-0276
Redhat
No data.