A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service.
This issue affects Junos OS:
* All versions before 21.4R3-S6,
* 22.2 versions before 22.2R3-S3,
* 22.3 versions before 22.3R3-S3,
* 22.4 versions before 22.4R3,
* 23.2 versions before 23.2R2.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA82988 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2024-07-11T16:03:26.980Z
Updated: 2024-08-02T04:26:15.162Z
Reserved: 2024-06-25T15:12:53.240Z
Link: CVE-2024-39529
Vulnrichment
Updated: 2024-07-11T18:29:52.305Z
NVD
Status : Awaiting Analysis
Published: 2024-07-11T16:15:04.343
Modified: 2024-07-11T18:09:58.777
Link: CVE-2024-39529
Redhat
No data.