
CVE-2017-10608 – SRX series: Junos OS: SRX series using IPv6 Sun/MS-RPC ALGs may experience flowd crash on processing packets.
https://notcve.org/view.php?id=CVE-2017-10608
13 Oct 2017 — Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected... • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-10619 – Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets
https://notcve.org/view.php?id=CVE-2017-10619
13 Oct 2017 — When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled b... • https://kb.juniper.net/JSA10821 •

CVE-2017-10620 – SRX Series: Antivirus updates are downloaded without verification
https://notcve.org/view.php?id=CVE-2017-10620
13 Oct 2017 — Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110; Juniper Networks Junos OS en dispositivos de la serie SRX no verifica el certificado del servidor HTTPS... • https://kb.juniper.net/JSA10822 • CWE-295: Improper Certificate Validation •

CVE-2017-10605 – Junos: SRX Series denial of service vulnerability in flowd due to crafted DHCP packet
https://notcve.org/view.php?id=CVE-2017-10605
14 Jul 2017 — On all vSRX and SRX Series devices, when the DHCP or DHCP relay is configured, specially crafted packet might cause the flowd process to crash, halting or interrupting traffic from flowing through the device(s). Repeated crashes of the flowd process may constitute an extended denial of service condition for the device(s). If the device is configured in high-availability, the RG1+ (data-plane) will fail-over to the secondary node. If the device is configured in stand-alone, there will be temporary traffic in... • http://www.securitytracker.com/id/1038891 • CWE-20: Improper Input Validation •

CVE-2017-2343 – SRX Series: Hardcoded credentials in Integrated UserFW feature.
https://notcve.org/view.php?id=CVE-2017-2343
14 Jul 2017 — The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series... • http://www.securitytracker.com/id/1038904 • CWE-798: Use of Hard-coded Credentials •

CVE-2016-1285 – bind: malformed packet sent to rndc can trigger assertion failure
https://notcve.org/view.php?id=CVE-2016-1285
09 Mar 2016 — named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c. named en ISC BIND 9.x en versiones anteriores a 9.9.8-P4 y 9.10.x en versiones anteriores a 9.10.3-P4 no maneja adecuadamente los archivos DNAME cuando analiza gramaticalmente l... • http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html • CWE-617: Reachable Assertion •

CVE-2016-1286 – bind: malformed signature records for DNAME records can trigger assertion failure
https://notcve.org/view.php?id=CVE-2016-1286
09 Mar 2016 — named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c. named en ISC BIND 9.x en versiones anteriores a 9.9.8-P4 y 9.10.x en versiones anteriores a 9.10.3-P4 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida de demonio) a través de un registro de firma manipulado para un registro DNAME, ... • http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html • CWE-617: Reachable Assertion •

CVE-2015-5363
https://notcve.org/view.php?id=CVE-2015-5363
16 Jul 2015 — The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 allows remote DNS servers to cause a denial of service (crash) via a crafted DNS response. El demonio SRX de seguridad de red en la serie SRX de Juniper de servicios de puerta de enlace con sistema operativo Junos 12.1X44 anterior a 12.1X44-D50, 12.1X46 anterior a 12.1X46-D35, 12.1X47 anterior a 12.1X47-D25... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10692 • CWE-19: Data Processing Errors •

CVE-2014-9708 – Appweb Web Server Denial of Service
https://notcve.org/view.php?id=CVE-2014-9708
28 Mar 2015 — Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,". Embedthis Appweb anterior a 4.6.6 y 5.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) a través de una cabecera de rango con un valor vacío, tal y como fue demostrado por 'Rango: x=,'. Appweb Web Server suffers from a denial of service vulnerabilit... • https://packetstorm.news/files/id/131157 • CWE-476: NULL Pointer Dereference •