{"uuid": "767b9276-2765-49fc-97d9-c23255df572d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39536", "type": "seen", "source": "https://t.me/cvedetector/693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39536 - A Missing Release of Memory after Effective Lifeti\", \n  \"Content\": \"CVE ID : CVE-2024-39536 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a   \n  \nDenial-of-Service (DoS).  \n  \n  \nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.  \n  \n  \n  \nWhether the leak occurs can be monitored with the following CLI command:  \n  \n&gt; show ppm request-queue  \n  \n  \nFPC \u00a0 \u00a0 Pending-request  \nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02  \nrequest-total-pending: 2  \n  \n  \nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0  \n  \n  \n  \n  \nThis issue affects:  \n  \nJunos OS:  \n  \n  \n  *  All versions before 21.2R3-S8,  \n  *  21.4 versions before 21.4R3-S7,  \n  *  22.1 versions before 22.1R3-S4,  \n  *  22.2 versions before 22.2R3-S4,\u00a0  \n  *  22.3 versions before 22.3R3,  \n  *  22.4 versions before 22.4R2-S2, 22.4R3,  \n  *  23.1 versions before 23.1R2.  \n  \n  \n  \nJunos OS Evolved:  \n  *  All versions before 21.2R3-S8-EVO,  \n  *  21.4-EVO versions before 21.4R3-S7-EVO,  \n  *  22.2-EVO versions before 22.2R3-S4-EVO,  \n  *  22.3-EVO versions before 22.3R3-EVO,  \n  *  22.4-EVO versions before 22.4R3-EVO,  \n  *  23.2-EVO versions before 23.2R1-EVO. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:11.000000Z"}