Total vulnerabilities in the database
A Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks Junos OS allows authenticated, low privileged, local attacker to cause a Denial of Service (DoS).
On an SRX 5000 Series device, when executing a specific command repeatedly, memory is corrupted, which leads to a Flow Processing Daemon (flowd) crash.
The NSD process has to be restarted to restore services.
If this issue occurs, it can be checked with the following command:
user@host> request security policies check The following log message can also be observed:
Error: policies are out of sync for PFE node<number>.fpc<number>.pic<number>. This issue affects:
Juniper Networks Junos OS on SRX 5000 Series
Software | From | Fixed in |
---|---|---|
juniper / junos | 20.4-r1 | 20.4-r1.x |
juniper / junos | 20.4-r1-s1 | 20.4-r1-s1.x |
juniper / junos | 21.1-r1 | 21.1-r1.x |
juniper / junos | 20.4-r2 | 20.4-r2.x |
juniper / junos | 21.2-r1 | 21.2-r1.x |
juniper / junos | 20.4-r2-s1 | 20.4-r2-s1.x |
juniper / junos | 21.1-r1-s1 | 21.1-r1-s1.x |
juniper / junos | 21.2-r1-s1 | 21.2-r1-s1.x |
juniper / junos | 21.1-r2 | 21.1-r2.x |
juniper / junos | 20.4-r3 | 20.4-r3.x |
juniper / junos | 21.3-r1 | 21.3-r1.x |
juniper / junos | 21.3-r2 | 21.3-r2.x |
juniper / junos | 21.2-r2 | 21.2-r2.x |
juniper / junos | 20.4-r3-s1 | 20.4-r3-s1.x |
juniper / junos | 20.4-r2-s2 | 20.4-r2-s2.x |
juniper / junos | 21.1-r3 | 21.1-r3.x |
juniper / junos | 21.1-r2-s1 | 21.1-r2-s1.x |
juniper / junos | 21.2 | 21.2.x |
juniper / junos | 21.1 | 21.1.x |
juniper / junos | 20.4 | 20.4.x |
juniper / junos | 21.1-r2-s2 | 21.1-r2-s2.x |
juniper / junos | 21.2-r1-s2 | 21.2-r1-s2.x |
juniper / junos | 21.2-r2-s1 | 21.2-r2-s1.x |
juniper / junos | 21.2-r2-s2 | 21.2-r2-s2.x |
juniper / junos | 21.4-r1-s1 | 21.4-r1-s1.x |
juniper / junos | 21.3-r1-s1 | 21.3-r1-s1.x |
juniper / junos | 21.3-r1-s2 | 21.3-r1-s2.x |
juniper / junos | 21.4-r1 | 21.4-r1.x |
juniper / junos | 21.3-r2-s1 | 21.3-r2-s1.x |
juniper / junos | 21.3-r2-s2 | 21.3-r2-s2.x |
juniper / junos | 21.4-r1-s2 | 21.4-r1-s2.x |
juniper / junos | 20.4-r3-s2 | 20.4-r3-s2.x |
juniper / junos | 21.1-r3-s1 | 21.1-r3-s1.x |
juniper / junos | 21.2-r3 | 21.2-r3.x |
juniper / junos | 22.1-r1 | 22.1-r1.x |
juniper / junos | 21.3-r3 | 21.3-r3.x |
juniper / junos | 21.3-r3-s1 | 21.3-r3-s1.x |
juniper / junos | 21.4-r2 | 21.4-r2.x |
juniper / junos | 21.4-r2-s1 | 21.4-r2-s1.x |
juniper / junos | 20.4-r3-s3 | 20.4-r3-s3.x |
juniper / junos | 21.4 | 21.4.x |
juniper / junos | 21.3 | 21.3.x |
juniper / junos | 21.1-r3-s2 | 21.1-r3-s2.x |
juniper / junos | 22.1-r1-s1 | 22.1-r1-s1.x |
juniper / junos | 22.1-r2 | 22.1-r2.x |
juniper / junos | 21.4-r3 | 21.4-r3.x |
juniper / junos | 22.1-r1-s2 | 22.1-r1-s2.x |
juniper / junos | 22.1-r2-s2 | 22.1-r2-s2.x |
juniper / junos | 21.4-r2-s2 | 21.4-r2-s2.x |
juniper / junos | 22.2-r1 | 22.2-r1.x |
juniper / junos | 22.2-r1-s1 | 22.2-r1-s1.x |
juniper / junos | 20.4-r3-s4 | 20.4-r3-s4.x |
juniper / junos | 21.2-r3-s2 | 21.2-r3-s2.x |
juniper / junos | 21.2-r3-s1 | 21.2-r3-s1.x |
juniper / junos | 22.3-r1 | 22.3-r1.x |
juniper / junos | 21.1-r3-s3 | 21.1-r3-s3.x |
juniper / junos | 22.2-r2 | 22.2-r2.x |
juniper / junos | 21.1-r3-s4 | 21.1-r3-s4.x |
juniper / junos | 21.3-r3-s2 | 21.3-r3-s2.x |
juniper / junos | 22.1-r3 | 22.1-r3.x |
juniper / junos | 20.4-r3-s5 | 20.4-r3-s5.x |
juniper / junos | 22.2-r1-s2 | 22.2-r1-s2.x |
juniper / junos | - | 20.4 |
juniper / junos | 21.4-r3-s1 | 21.4-r3-s1.x |
juniper / junos | 22.2-r2-s1 | 22.2-r2-s1.x |
juniper / junos | 22.1-r2-s1 | 22.1-r2-s1.x |
juniper / junos | 21.2-r3-s3 | 21.2-r3-s3.x |
juniper / junos | 21.4-r3-s2 | 21.4-r3-s2.x |
juniper / junos | 22.3-r1-s1 | 22.3-r1-s1.x |
juniper / junos | 22.2-r2-s2 | 22.2-r2-s2.x |
juniper / junos | 22.3-r1-s2 | 22.3-r1-s2.x |
juniper / junos | 22.2 | 22.2.x |
juniper / junos | 22.3 | 22.3.x |
juniper / junos | 22.1 | 22.1.x |