{"containers":{"cna":{"affected":[{"platforms":["SRX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"status":"affected","version":"17.3"},{"lessThan":"12.3X48-D90","status":"affected","version":"12.3X48","versionType":"custom"},{"lessThan":"15.1X49-D180","status":"affected","version":"15.1X49","versionType":"custom"},{"lessThan":"17.4R2-S5, 17.4R3","status":"affected","version":"17.4","versionType":"custom"},{"lessThan":"18.1R3-S6","status":"affected","version":"18.1","versionType":"custom"},{"lessThan":"18.2R2-S4, 18.2R3","status":"affected","version":"18.2","versionType":"custom"},{"lessThan":"18.3R2-S1, 18.3R3","status":"affected","version":"18.3","versionType":"custom"},{"lessThan":"18.4R2","status":"affected","version":"18.4","versionType":"custom"},{"lessThan":"19.1R1-S1, 19.1R2","status":"affected","version":"19.1","versionType":"custom"}]}],"datePublic":"2019-10-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R2-S4, 18.2R3; 18.3 versions prior to 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S1, 19.1R2."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en","type":"text"}]},{"descriptions":[{"cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-10-09T19:26:17.000Z","orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://kb.juniper.net/JSA10968"}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: 12.3X48-D90, 15.1X49-D180, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.3R2-S1, 18.3R3, 18.4R2, 19.1R1-S1, 19.1R2, 19.2R1, and all subsequent releases."}],"source":{"advisory":"JSA10968","defect":["1417510"],"discovery":"USER"},"title":"Junos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets","workarounds":[{"lang":"en","value":"There are no available workarounds for this issue."}],"x_generator":{"engine":"Vulnogram 0.0.6"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"sirt@juniper.net","DATE_PUBLIC":"2019-10-09T16:00:00.000Z","ID":"CVE-2019-0068","STATE":"PUBLIC","TITLE":"Junos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Junos OS","version":{"version_data":[{"platform":"SRX Series","version_affected":"<","version_name":"12.3X48","version_value":"12.3X48-D90"},{"platform":"SRX Series","version_affected":"<","version_name":"15.1X49","version_value":"15.1X49-D180"},{"platform":"SRX Series","version_affected":"=","version_name":"17.3","version_value":"17.3"},{"platform":"SRX Series","version_affected":"<","version_name":"17.4","version_value":"17.4R2-S5, 17.4R3"},{"platform":"SRX Series","version_affected":"<","version_name":"18.1","version_value":"18.1R3-S6"},{"platform":"SRX Series","version_affected":"<","version_name":"18.2","version_value":"18.2R2-S4, 18.2R3"},{"platform":"SRX Series","version_affected":"<","version_name":"18.3","version_value":"18.3R2-S1, 18.3R3"},{"platform":"SRX Series","version_affected":"<","version_name":"18.4","version_value":"18.4R2"},{"platform":"SRX Series","version_affected":"<","version_name":"19.1","version_value":"19.1R1-S1, 19.1R2"}]}}]},"vendor_name":"Juniper Networks"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R2-S4, 18.2R3; 18.3 versions prior to 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S1, 19.1R2."}]},"exploit":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"generator":{"engine":"Vulnogram 0.0.6"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service (DoS)"}]},{"description":[{"lang":"eng","value":"CWE-754 Improper Check for Unusual or Exceptional Conditions"}]}]},"references":{"reference_data":[{"name":"https://kb.juniper.net/JSA10968","refsource":"CONFIRM","url":"https://kb.juniper.net/JSA10968"}]},"solution":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: 12.3X48-D90, 15.1X49-D180, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.3R2-S1, 18.3R3, 18.4R2, 19.1R1-S1, 19.1R2, 19.2R1, and all subsequent releases."}],"source":{"advisory":"JSA10968","defect":["1417510"],"discovery":"USER"},"work_around":[{"lang":"en","value":"There are no available workarounds for this issue."}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T17:37:07.434Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kb.juniper.net/JSA10968"}]}]},"cveMetadata":{"assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","cveId":"CVE-2019-0068","datePublished":"2019-10-09T19:26:17.903Z","dateReserved":"2018-10-11T00:00:00.000Z","dateUpdated":"2024-09-17T04:09:30.020Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}