{"uuid": "ca36346d-5858-4e85-b8b6-f7caa6c7ac82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39550", "type": "seen", "source": "https://t.me/cvedetector/682", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39550 - A Missing Release of Memory after Effective Lifeti\", \n  \"Content\": \"CVE ID : CVE-2024-39550 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process\u00a0of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps)\u00a0to cause a slow memory leak, ultimately leading to a Denial of Service (DoS).   \n  \nMemory can only be recovered by manually restarting rtlogd process.\u00a0  \nThe memory usage can be monitored using the below command.  \n  \n\u2003\u2003\u2003\u2003user@host&gt; show system processes extensive | match rtlog\u00a0  \n  \n  \n  \nThis issue affects Junos OS on MX Series with SPC3 line card:\u00a0  \n  \n  \n  \n  *  from 21.2R3 before 21.2R3-S8,\u00a0  \n  *  from 21.4R2 before 21.4R3-S6,\u00a0  \n  *  from 22.1 before 22.1R3-S5,\u00a0  \n  *  from 22.2 before 22.2R3-S3,\u00a0  \n  *  from 22.3 before 22.3R3-S2,\u00a0  \n  *  from 22.4 before 22.4R3-S1,\u00a0  \n  *  from 23.2 before 23.2R2,\u00a0  \n  *  from 23.4 before 23.4R2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:56.000000Z"}