First published: Thu Oct 17 2013(Updated: )
Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | <=10.4 | |
Juniper JUNOS | =4.0 | |
Juniper JUNOS | =4.1 | |
Juniper JUNOS | =4.2 | |
Juniper JUNOS | =4.3 | |
Juniper JUNOS | =4.4 | |
Juniper JUNOS | =5.0 | |
Juniper JUNOS | =5.1 | |
Juniper JUNOS | =5.2 | |
Juniper JUNOS | =5.3 | |
Juniper JUNOS | =5.4 | |
Juniper JUNOS | =5.5 | |
Juniper JUNOS | =5.6 | |
Juniper JUNOS | =5.7 | |
Juniper JUNOS | =6.0 | |
Juniper JUNOS | =6.1 | |
Juniper JUNOS | =6.2 | |
Juniper JUNOS | =6.3 | |
Juniper JUNOS | =6.4 | |
Juniper JUNOS | =7.0 | |
Juniper JUNOS | =7.1 | |
Juniper JUNOS | =7.2 | |
Juniper JUNOS | =7.3 | |
Juniper JUNOS | =7.4 | |
Juniper JUNOS | =7.5 | |
Juniper JUNOS | =7.6 | |
Juniper JUNOS | =8.0 | |
Juniper JUNOS | =8.1 | |
Juniper JUNOS | =8.2 | |
Juniper JUNOS | =8.3 | |
Juniper JUNOS | =8.4 | |
Juniper JUNOS | =9.0 | |
Juniper JUNOS | =9.1 | |
Juniper JUNOS | =9.2 | |
Juniper JUNOS | =9.4 | |
Juniper JUNOS | =9.5 | |
Juniper JUNOS | =9.6 | |
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1 | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper Srx100 | ||
Juniper Srx110 | ||
Juniper Srx1400 | ||
Juniper Srx210 | ||
Juniper Srx220 | ||
Juniper Srx240 | ||
Juniper Srx3400 | ||
Juniper Srx3600 | ||
Juniper Srx550 | ||
Juniper Srx5600 | ||
Juniper Srx5800 | ||
Juniper Srx650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.