Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos SRX Series Services Gateway Multicast Processing Flaw Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1037597
SecurityTracker URL:
CVE Reference:   CVE-2017-2300   (Links to External Site)
Date:  Jan 13 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): SRX Series
Description:   A vulnerability was reported in Juniper Junos SRX Series Services Gateway. A remote user can cause the target service to crash.

A remote user can send specially crafted multicast packets to cause the target flowd daemon to crash when synchronizing a multicast session. As a result, data plane redundancy groups will fail over to the secondary node in the chassis cluster while flowd daemon on the primary node restarts.

Chassis cluster configurations are affected when PIM is enabled on the services gateway.

The vendor has assigned PR 1188853 to this vulnerability.

Impact:   A remote user can cause the target flowd daemon to crash.
Solution:   The vendor has issued a fix (12.1X46-D65, 12.3X48-D40, 15.1X49-D60).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC