"value":"On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition.\n\nAffected releases are Juniper Networks Junos OS:\n12.1X46 versions prior to 12.1X46-D60 on SRX series;\n12.3X48 versions prior to 12.3X48-D35 on SRX series;\n14.1 versions prior to 14.1R9 on MX series;\n14.2 versions prior to 14.2R8 on MX series;\n15.1X49 versions prior to 15.1X49-D60 on SRX series;\n15.1 versions prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series;\n16.1 versions prior to 16.1R6 on MX series;\n16.2 versions prior to 16.2R3 on MX series;\n17.1 versions prior to 17.1R2-S4, 17.1R3 on MX series.\nNo other Juniper Networks products or platforms are affected by this issue.\n"
}
]
},
"exploit":[
{
"lang":"eng",
"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
"value":"The following software releases have been updated to resolve this specific issue: 12.1X46-D60, 12.3X48-D35, 14.1R9, 14.2R8, 15.1X49-D60, 15.1R5-S8, 15.1R6-S4, 15.1F6-S9, 15.1R7, 16.1R6, 16.2R3, 17.1R2-S4, 17.1R3, 17.2R1 and all subsequent releases.\n\n"
}
],
"source":{
"advisory":"JSA10829",
"defect":[
"1183181"
],
"discovery":"USER"
},
"work_around":[
{
"lang":"eng",
"value":"Disable IPv4 ALG's on affected devices.\n"