An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of  Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).  Continued receipt and processing of these specific packets will sustain the Denial of Service condition. The memory usage can be monitored using the below command.   user@host> show usp memory segment sha data objcache jsf  This issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:  *  20.4 before 20.4R3-S10,  *  21.2 before 21.2R3-S6,  *  21.3 before 21.3R3-S5,  *  21.4 before 21.4R3-S6,  *  22.1 before 22.1R3-S4,  *  22.2 before 22.2R3-S2,  *  22.3 before 22.3R3-S1,  *  22.4 before 22.4R3,  *  23.2 before 23.2R2.
References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published: 2024-07-11T16:29:46.607Z

Updated: 2024-08-02T04:26:15.947Z

Reserved: 2024-06-25T15:12:53.246Z

Link: CVE-2024-39551

cve-icon Vulnrichment

Updated: 2024-07-11T18:43:33.317Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-11T17:15:16.140

Modified: 2024-11-21T09:27:59.563

Link: CVE-2024-39551

cve-icon Redhat

No data.