Vulnerability Database

289,697

Total vulnerabilities in the database

CVE-2024-39557

An Uncontrolled Resource Consumption vulnerability in the

Layer 2 Address Learning Daemon (l2ald)

of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS).

Certain MAC table updates cause a small amount of memory to leak.  Once memory utilization reaches its limit, the issue will result in a system crash and restart.

To identify the issue, execute the CLI command:

user@device> show platform application-info allocations app l2ald-agent EVL Object Allocation Statistics:

Node   Application     Context Name                               Live   Allocs   Fails     Guids re0   l2ald-agent               net::juniper::rtnh::L2Rtinfo       1069096 1069302   0         1069302 re0   l2ald-agent               net::juniper::rtnh::NHOpaqueTlv     114     195       0         195

This issue affects Junos OS Evolved:

  • All versions before 21.4R3-S8-EVO,

  • from 22.2-EVO before 22.2R3-S4-EVO,

  • from 22.3-EVO before 22.3R3-S3-EVO,

  • from 22.4-EVO before 22.4R3-EVO,

  • from 23.2-EVO before 23.2R2-EVO.

  • Published: Jul 11, 2024
  • Updated: Jul 11, 2024
  • CVE: CVE-2024-39557
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.5
  • AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

No CWE or OWASP classifications available.

Software From Fixed in
juniper / junos_os_evolved 21.4-r1 21.4-r1.x
juniper / junos_os_evolved 21.4-r1-s1 21.4-r1-s1.x
juniper / junos_os_evolved 21.4 21.4.x
juniper / junos_os_evolved 21.4-r2 21.4-r2.x
juniper / junos_os_evolved 21.4-r2-s1 21.4-r2-s1.x
juniper / junos_os_evolved 21.4-r2-s2 21.4-r2-s2.x
juniper / junos_os_evolved 21.4-r1-s2 21.4-r1-s2.x
juniper / junos_os_evolved 21.4-r3 21.4-r3.x
juniper / junos_os_evolved 21.4-r3-s1 21.4-r3-s1.x
juniper / junos_os_evolved 21.4-r3-s2 21.4-r3-s2.x
juniper / junos_os_evolved 21.4-r3-s3 21.4-r3-s3.x
juniper / junos_os_evolved 22.2-r1 22.2-r1.x
juniper / junos_os_evolved 22.2-r1-s1 22.2-r1-s1.x
juniper / junos_os_evolved 22.2-r2 22.2-r2.x
juniper / junos_os_evolved 22.2-r2-s1 22.2-r2-s1.x
juniper / junos_os_evolved 22.2-r2-s2 22.2-r2-s2.x
juniper / junos_os_evolved 22.2-r3 22.2-r3.x
juniper / junos_os_evolved 22.3-r1 22.3-r1.x
juniper / junos_os_evolved - 21.4
juniper / junos_os_evolved 21.4-r3-s4 21.4-r3-s4.x
juniper / junos_os_evolved 22.2 22.2.x
juniper / junos_os_evolved 22.2-r3-s1 22.2-r3-s1.x
juniper / junos_os_evolved 22.2-r3-s2 22.2-r3-s2.x
juniper / junos_os_evolved 22.3 22.3.x
juniper / junos_os_evolved 22.3-r1-s1 22.3-r1-s1.x
juniper / junos_os_evolved 22.3-r1-s2 22.3-r1-s2.x
juniper / junos_os_evolved 22.3-r2 22.3-r2.x
juniper / junos_os_evolved 22.3-r2-s1 22.3-r2-s1.x
juniper / junos_os_evolved 22.3-r2-s2 22.3-r2-s2.x
juniper / junos_os_evolved 22.3-r3 22.3-r3.x
juniper / junos_os_evolved 22.3-r3-s1 22.3-r3-s1.x
juniper / junos_os_evolved 22.4 22.4.x
juniper / junos_os_evolved 22.4-r1 22.4-r1.x
juniper / junos_os_evolved 22.4-r1-s1 22.4-r1-s1.x
juniper / junos_os_evolved 22.4-r1-s2 22.4-r1-s2.x
juniper / junos_os_evolved 22.4-r2 22.4-r2.x
juniper / junos_os_evolved 22.4-r2-s1 22.4-r2-s1.x
juniper / junos_os_evolved 22.4-r2-s2 22.4-r2-s2.x
juniper / junos_os_evolved 23.2 23.2.x
juniper / junos_os_evolved 23.2-r1 23.2-r1.x
juniper / junos_os_evolved 23.2-r1-s1 23.2-r1-s1.x
juniper / junos_os_evolved 23.2-r1-s2 23.2-r1-s2.x
juniper / junos_os_evolved 21.4-r3-s5 21.4-r3-s5.x
juniper / junos_os_evolved 21.4-r3-s6 21.4-r3-s6.x
juniper / junos_os_evolved 21.4-r3-s7 21.4-r3-s7.x
juniper / junos_os_evolved 22.2-r1-s2 22.2-r1-s2.x
juniper / junos_os_evolved 22.2-r3-s3 22.2-r3-s3.x
juniper / junos_os_evolved 22.3-r3-s2 22.3-r3-s2.x