漏洞标题
Junos OS: SRX 4600 和 SRX 5000 系列: 配置为 L2 透明接收特定真实的 packets 的 SRXes 收到这些 packets 会引发 DoS。
漏洞描述信息
Junos OS:SRX 4600 和 SRX 5000 系列:配置为 L2 透明的 SRX 接收特定真实数据包会导致拒绝服务 (DoS) 攻击。
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
不可达退出条件的循环(无限循环)
漏洞标题
Junos OS: SRX 4600 and SRX 5000 Series: The receipt of specific genuine packets by SRXes configured for L2 transparency will cause a DoS
漏洞描述信息
An Incomplete Internal State Distinction vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series allows an adjacent attacker to cause a Denial of Service (DoS).
If an SRX is configured in L2 transparent mode the receipt of a specific genuine packet can cause a single Packet Processing Engines (PPE) component of the PFE to run into a loop, which in turn will render the PPE unavailable. Each packet will cause one PPE to get into a loop, leading to a gradual performance degradation until all PPEs are unavailable and all traffic processing stops. To recover the affected FPC need to be restarted.
This issue affects Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series:
20.1 version 20.1R1 and later versions;
20.2 versions prior to 20.2R3-S7;
20.3 version 20.3R1 and later versions;
20.4 versions prior to 20.4R3-S7;
21.1 versions prior to 21.1R3-S5;
21.2 versions prior to 21.2R3-S3;
21.3 versions prior to 21.3R3-S3;
21.4 versions prior to 21.4R3-S1;
22.1 versions prior to 22.1R3;
22.2 versions prior to 22.2R2;
22.3 versions prior to 22.3R1-S1, 22.3R2.
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
不完整的内部状态区分
漏洞标题
Juniper Networks Junos OS SRX 安全漏洞
漏洞描述信息
Juniper Networks Junos OS SRX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS SRX存在安全漏洞,该漏洞源于数据包转发引擎(PFE)中存在不完全内部状态区分漏洞,攻击者可利用该漏洞造成拒绝服务(DoS)。受影响的产品和版本:Juniper Networks Junos OS 20.1R1及更高版本;20.2R3-S7之前的20
CVSS信息
N/A
漏洞类别
其他