A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices | Vendor Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-10 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-14810
Mitre link : CVE-2019-14810
CVE.ORG link : CVE-2019-14810
JSON object : View
Products Affected
arista
- 7280r
- 7500r
- 7280e
- 7020r
- extensible_operating_system
- 7500r3
- 7280r3
- 7500e
- 7500r2
- 7280r2
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')