This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Junos device
is affected by a denial of service vulnerability. A remote attacker,
by sending a specially crafted SIP packet to an SRX series device, can
crash the 'flowd' process.
Note that this issue only affects SRX series devices when SIP ALG is
enabled. All SRX devices, except for SRX-HE devices, have SIP ALG
enabled by default.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10633.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true