First published: Sat Jan 11 2014(Updated: )
Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =10.4 | |
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1r | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper Srx100 | ||
Juniper Srx110 | ||
Juniper Srx1400 | ||
Juniper Srx210 | ||
Juniper Srx220 | ||
Juniper Srx240 | ||
Juniper Srx3400 | ||
Juniper Srx3600 | ||
Juniper Srx550 | ||
Juniper Srx5600 | ||
Juniper Srx5800 | ||
Juniper Srx650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.