QID 43930

Date Published: 2022-10-20

QID 43930: Juniper JUNOS Session Initiation Protocol (SIP) Application Layer Gateway (ALG) Denial of Service (DoS) Vulnerability (JSA11284)

Juniper Junos is the network operating system used in Juniper Networks hardware systems.

A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition.

Making this QID as practice as we cannot add SIP ALG enabled check in signature.
Affected Junos OS versions:
20.4 versions prior to 20.4R3-S2
21.1 versions prior to 21.1R2-S1, 21.1R3
21.2 versions prior to 21.2R2
21.3 versions prior to 21.3R2

NOTE:
This vulnerability only affects to MX Series and SRX series.

QID detection logic: (Authenticated)
It checks for vulnerable Junos OS version.

Successful exploitation of this vulnerability may cause a flowd crash and thereby a Denial of Service (DoS)

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    The following software releases have been updated to resolve this specific issue For more information please visit JSA11284

    CVEs related to QID 43930

    Software Advisories
    Advisory ID Software Component Link
    JSA11284 URL Logo kb.juniper.net/JSA11284