"value":"A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart.\nThis issue affects Juniper Networks Junos OS on SRX Series:\nAll versions prior to 19.3R3-S7;\n19.4 versions prior to 19.4R2-S8, 19.4R3-S10;\n20.2 versions prior to 20.2R3-S6;\n20.3 versions prior to 20.3R3-S5;\n20.4 versions prior to 20.4R3-S5;\n21.1 versions prior to 21.1R3-S4;\n21.2 versions prior to 21.2R3;\n21.3 versions prior to 21.3R3;\n21.4 versions prior to 21.4R2."
}
]
},
"exploit":[
{
"lang":"eng",
"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
"value":"The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R2-S8, 19.4R3-S10, 20.2R3-S6, 20.3R3-S5, 20.4R3-S5, 21.1R3-S4, 21.2R3, 21.3R3, 21.4R2, 22.1R1, and all subsequent releases.\n"
}
],
"source":{
"advisory":"JSA70213",
"defect":[
"1639998"
],
"discovery":"USER"
},
"work_around":[
{
"lang":"eng",
"value":"There are no known workarounds for this issue."