Описание
An Incorrect Calculation of Buffer Size vulnerability in Juniper Networks Junos OS SRX 5000 Series devices using SPC2 line cards while ALGs are enabled allows an attacker sending specific crafted packets to cause a transit traffic Denial of Service (DoS).
Continued receipt and processing of these specific packets will sustain the Denial of Service condition.
This issue affects: Juniper Networks Junos OS SRX 5000 Series with SPC2 with ALGs enabled.
- All versions earlier than 21.2R3-S7;
- 21.4 versions earlier than 21.4R3-S6;
- 22.1 versions earlier than 22.1R3-S5;
- 22.2 versions earlier than 22.2R3-S3;
- 22.3 versions earlier than 22.3R3-S2;
- 22.4 versions earlier than 22.4R3;
- 23.2 versions earlier than 23.2R2.
Ссылки
- Vendor Advisory
- Not Applicable
- Vendor Advisory
- Not Applicable
Уязвимые конфигурации
Одновременно
Одно из
Одно из
EPSS
7.5 High
CVSS3
Дефекты
Связанные уязвимости
An Incorrect Calculation of Buffer Size vulnerability in Juniper Networks Junos OS SRX 5000 Series devices using SPC2 line cards while ALGs are enabled allows an attacker sending specific crafted packets to cause a transit traffic Denial of Service (DoS). Continued receipt and processing of these specific packets will sustain the Denial of Service condition. This issue affects: Juniper Networks Junos OS SRX 5000 Series with SPC2 with ALGs enabled. * All versions earlier than 21.2R3-S7; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R2.
Уязвимость модуля Application Layer Gateway (ALG) операционных систем Juniper Networks Junos OS сетевых устройств серии SRX 5000, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.5 High
CVSS3