{"uuid": "5fa820dd-bfdb-4890-af72-1527679c331f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39560", "type": "seen", "source": "https://t.me/cvedetector/606", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39560 - An Improper Handling of Exceptional Conditions vul\", \n  \"Content\": \"CVE ID : CVE-2024-39560 \nPublished : July 10, 2024, 11:15 p.m. | 16\u00a0minutes ago \nDescription : An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).  \n  \nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.  \n  \nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:  \n  \nuser@router&gt; show system statistics kernel memory  \nMemory  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0  Size (kB)  Percentage  When  \n\u00a0 Active  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092  \u00a0 \u00a0  18.4%  Now  \n\u00a0 Inactive  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300  \u00a0 \u00a0  14.0%  Now  \n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236  \u00a0 \u00a0  10.8%  Now  \n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204  \u00a0 \u00a0  46.6%  Now  \n\u00a0 Buf  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8%  Now  \n\u00a0 Free  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4%  Now  \nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now  \n\u00a0 Data  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6%  Now  \n\u00a0 Text  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1%  Now  \n...  \n  \nThis issue affects:  \nJunos OS:  \n  \n  \n  *  All versions before 20.4R3-S9,  \n  *  from 21.4 before 21.4R3-S5,  \n  *  from 22.1 before 22.1R3-S5,  \n  *  from 22.2 before 22.2R3-S3,  \n  *  from 22.3 before 22.3R3-S2,  \n  *  from 22.4 before 22.4R3,  \n  *  from 23.2 before 23.2R2;  \n  \n  \nJunos OS Evolved:  \n  \n  \n  *  All versions before 21.4R3-S5-EVO,  \n  *  from 22.1-EVO before 22.1R3-S5-EVO,   \n  *  from 22.2-EVO before 22.2R3-S3-EVO,   \n  *  from 22.3-EVO before 22.3R3-S2-EVO,   \n  *  from 22.4-EVO before 22.4R3-EVO,   \n  *  from 23.2-EVO before 23.2R2-EVO. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T01:35:23.000000Z"}