{ "schema_version": "1.4.0", "id": "GHSA-gp8q-5m2c-vprm", "modified": "2022-05-24T17:39:20Z", "published": "2022-05-24T17:39:20Z", "aliases": [ "CVE-2021-0209" ], "details": "In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0209" }, { "type": "WEB", "url": "https://kb.juniper.net/JSA11099" } ], "database_specific": { "cwe_ids": [ "CWE-824" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-01-15T18:15:00Z" } }