An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).
Continued receipt and processing of these specific packets will sustain the Denial of Service condition.
The memory usage can be monitored using the below command.
user@host> show usp memory segment sha data objcache jsf
This issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:
* 20.4 before 20.4R3-S10,
* 21.2 before 21.2R3-S6,
* 21.3 before 21.3R3-S5,
* 21.4 before 21.4R3-S6,
* 22.1 before 22.1R3-S4,
* 22.2 before 22.2R3-S2,
* 22.3 before 22.3R3-S1,
* 22.4 before 22.4R3,
* 23.2 before 23.2R2.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA83013 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2024-07-11T16:29:46.607Z
Updated: 2024-08-02T04:26:15.947Z
Reserved: 2024-06-25T15:12:53.246Z
Link: CVE-2024-39551
Vulnrichment
Updated: 2024-07-11T18:43:33.317Z
NVD
Status : Awaiting Analysis
Published: 2024-07-11T17:15:16.140
Modified: 2024-11-21T09:27:59.563
Link: CVE-2024-39551
Redhat
No data.