No analysis available yet.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 20.4R3-S5, 21.1R3-S4, 21.2R3-S2, 21.3R3-S1, 21.4R3, 22.1R1-S2, 22.1R2, 22.2R1-S1, 22.2R2, 22.3R1, and all subsequent releases.
Vendor Workaround
There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26579 | A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA70212 |
|
Tue, 08 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-04-08T16:48:51.747Z
Reserved: 2022-12-27T00:00:00.000Z
Link: CVE-2023-22416
Updated: 2024-08-02T10:07:06.537Z
Status : Modified
Published: 2023-01-13T00:15:11.753
Modified: 2024-11-21T07:44:46.557
Link: CVE-2023-22416
No data.
OpenCVE Enrichment
No data.
EUVD