Junos OS: FPC process crashes after J-Flow processes a malformed packet (JSA10914)
Medium Nessus Plugin ID 121126
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionAccording to its self-reported version number, the remote Juniper Junos device is affected by a denial of service vulnerability. By continuously sending the offending packet, an attacker can repeatedly crash the FPC process causing a sustained Denial of Service (DoS).
This issue affects both IPv4 and IPv6 packet processing.
SolutionApply the relevant Junos software release referenced in Juniper advisory JSA10914.