Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6vpf-6mrv-x8cr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.

On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.

EPSS

Процентиль: 59%
0.00389
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость операционной системы Junos OS маршрутизаторов SRX 5000 Series, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 59%
0.00389
Низкий

Дефекты

CWE-20