A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated malicious user to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions before 20.4R3-S5; 21.1 versions before 21.1R3-S4; 21.2 versions before 21.2R3-S2; 21.3 versions before 21.3R3-S1; 21.4 versions before 21.4R3; 22.1 versions before 22.1R1-S2, 22.1R2; 22.2 versions before 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions before 20.4R1 on SRX Series.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos |
||
juniper junos 20.4 |
||
juniper junos 21.1 |
||
juniper junos 21.2 |
||
juniper junos 21.3 |
||
juniper junos 21.4 |
||
juniper junos 22.1 |
||
juniper junos 22.2 |