Original Issue Date: March 03, 2022
Severity Rating: HIGH
Software Affected
Junos OS 20.4 versions prior to 20.4R3-S1, 20.4R3-S2;
Junos OS 21.1 versions prior to 21.1R2-S1, 21.1R2-S2, 21.1R3;
Junos OS 21.2 versions prior to 21.2R1-S2, 21.2R2;
Junos OS 21.3 versions prior to 21.3R1-S1, 21.3R2.
Overview
A Vulnerability has been reported in Juniper Networks Junos OS which could allow an unauthenticated, remote attacker to cause denial of service condition on an affected device.
Description
This vulnerability exists in the SIP ALG and flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series due to an improper locking flaw in the SIP ALG and stack-based buffer overflow in the flow processing daemon (flowd) that could allow the attacker to cause denial of service condition. An attacker could exploit this vulnerability by sending specially-crafted packets.
Successful exploitation of this vulnerability could allow the attacker to cause denial of Service condition.
Solution
Apply appropriate updates as mentioned in: