First published: Wed Oct 09 2019(Updated: )
SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protected by the SRX device must initiate a connection to the malicious server. This issue affects: Juniper Networks Junos OS on SRX5000 Series: 12.3X48 versions prior to 12.3X48-D85; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.3x48 | |
Juniper JUNOS | =12.3x48-d10 | |
Juniper JUNOS | =12.3x48-d15 | |
Juniper JUNOS | =12.3x48-d20 | |
Juniper JUNOS | =12.3x48-d25 | |
Juniper JUNOS | =12.3x48-d30 | |
Juniper JUNOS | =12.3x48-d35 | |
Juniper JUNOS | =12.3x48-d40 | |
Juniper JUNOS | =12.3x48-d45 | |
Juniper JUNOS | =12.3x48-d50 | |
Juniper JUNOS | =12.3x48-d55 | |
Juniper JUNOS | =12.3x48-d60 | |
Juniper JUNOS | =12.3x48-d65 | |
Juniper JUNOS | =12.3x48-d70 | |
Juniper JUNOS | =12.3x48-d75 | |
Juniper JUNOS | =12.3x48-d80 | |
Juniper SRX5400 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper JUNOS | =15.1x49 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d100 | |
Juniper JUNOS | =15.1x49-d110 | |
Juniper JUNOS | =15.1x49-d120 | |
Juniper JUNOS | =15.1x49-d130 | |
Juniper JUNOS | =15.1x49-d140 | |
Juniper JUNOS | =15.1x49-d150 | |
Juniper JUNOS | =15.1x49-d160 | |
Juniper JUNOS | =15.1x49-d170 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper JUNOS | =15.1x49-d30 | |
Juniper JUNOS | =15.1x49-d35 | |
Juniper JUNOS | =15.1x49-d40 | |
Juniper JUNOS | =15.1x49-d45 | |
Juniper JUNOS | =15.1x49-d50 | |
Juniper JUNOS | =15.1x49-d55 | |
Juniper JUNOS | =15.1x49-d60 | |
Juniper JUNOS | =15.1x49-d65 | |
Juniper JUNOS | =15.1x49-d70 | |
Juniper JUNOS | =15.1x49-d75 | |
Juniper JUNOS | =15.1x49-d80 | |
Juniper JUNOS | =15.1x49-d90 | |
Juniper JUNOS | =17.3 | |
Juniper JUNOS | =17.3-r2 | |
Juniper JUNOS | =17.3-r2-s1 | |
Juniper JUNOS | =17.3-r2-s2 | |
Juniper JUNOS | =17.3-r3-s1 | |
Juniper JUNOS | =17.3-r3-s2 | |
Juniper JUNOS | =17.3-r3-s3 | |
Juniper JUNOS | =17.3-r3-s4 | |
Juniper JUNOS | =17.3-r3-s5 | |
Juniper JUNOS | =17.3-r3-s6 | |
Juniper JUNOS | =17.4 | |
Juniper JUNOS | =17.4-r1 | |
Juniper JUNOS | =17.4-r1-s1 | |
Juniper JUNOS | =17.4-r1-s2 | |
Juniper JUNOS | =17.4-r1-s4 | |
Juniper JUNOS | =17.4-r1-s6 | |
Juniper JUNOS | =17.4-r1-s7 | |
Juniper JUNOS | =17.4-r2 | |
Juniper JUNOS | =17.4-r2-s1 | |
Juniper JUNOS | =17.4-r2-s3 | |
Juniper JUNOS | =17.4-r2-s4 | |
Juniper JUNOS | =17.4-r2-s5 | |
Juniper JUNOS | =18.1 | |
Juniper JUNOS | =18.1-r2 | |
Juniper JUNOS | =18.1-r2-s1 | |
Juniper JUNOS | =18.1-r2-s2 | |
Juniper JUNOS | =18.1-r2-s4 | |
Juniper JUNOS | =18.1-r3 | |
Juniper JUNOS | =18.1-r3-s2 | |
Juniper JUNOS | =18.1-r3-s3 | |
Juniper JUNOS | =18.1-r3-s4 | |
Juniper JUNOS | =18.1-r3-s5 | |
Juniper JUNOS | =18.1-r3-s6 | |
Juniper JUNOS | =18.1-r3-s7 | |
Juniper JUNOS | =18.2 | |
Juniper JUNOS | =18.2-r1-s5 | |
Juniper JUNOS | =18.2-r2-s1 | |
Juniper JUNOS | =18.2-r2-s2 | |
Juniper JUNOS | =18.2-r2-s3 | |
Juniper JUNOS | =18.2-r2-s4 | |
Juniper JUNOS | =18.3 | |
Juniper JUNOS | =18.3-r1 | |
Juniper JUNOS | =18.3-r1-s1 | |
Juniper JUNOS | =18.3-r1-s2 | |
Juniper JUNOS | =18.3-r1-s3 | |
Juniper JUNOS | =18.4 | |
Juniper JUNOS | =18.4-r1 | |
Juniper JUNOS | =18.4-r1-s2 | |
Juniper JUNOS | =19.1 | |
Juniper JUNOS | =19.1-r1 | |
Juniper JUNOS | =19.1-r1-s1 | |
Juniper JUNOS | =19.1-r1-s2 | |
Juniper JUNOS | =19.1-r1-s3 |
The following software releases have been updated to resolve this specific issue: 12.3X48-D85, 15.1X49-D180, 17.3R3-S7 (pending), 17.4R2-S6, 17.4R3, 18.1R3-S8 (pending), 18.2R3, 18.3R2, 18.4R2, 19.1R2, 19.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-0051 is classified as high due to its potential for causing denial of service conditions.
To fix CVE-2019-0051, update the Juniper JUNOS software to a version that addresses the vulnerability as outlined in the advisories.
CVE-2019-0051 affects specific versions of Junos, including 12.3x48 and certain versions within the 15.1x49 and 17.x releases.
CVE-2019-0051 impacts Juniper SRX devices that utilize the SSL-Proxy feature.
Yes, CVE-2019-0051 can be exploited remotely by SSL/TLS servers to crash the flowd daemon.