Juniper Junos SRX Series SIP ALG Remote DoS (JSA10633)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Junos device
is affected by a denial of service vulnerability. A remote attacker,
by sending a specially crafted SIP packet to an SRX series device, can
crash the 'flowd' process.

Note that this issue only affects SRX series devices when SIP ALG is
enabled. All SRX devices, except for SRX-HE devices, have SIP ALG
enabled by default.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10633

Solution :

Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10633.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Junos Local Security Checks

Nessus Plugin ID: 76502 ()

Bugtraq ID: 68551

CVE ID: CVE-2014-3815

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now