5.9

CVE-2019-14810

A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AristaExtensible Operating System Version >= 4.19 <= 4.19.12m
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version >= 4.20 <= 4.20.14m
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version >= 4.21.0f <= 4.21.2.3f
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version >= 4.21.3f <= 4.21.7
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version4.17
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version4.18
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
AristaExtensible Operating System Version4.22.1f
   Arista7020r Version-
   Arista7280e Version-
   Arista7280r Version-
   Arista7280r2 Version-
   Arista7280r3 Version-
   Arista7500e Version-
   Arista7500r Version-
   Arista7500r2 Version-
   Arista7500r3 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.28% 0.488
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.