
CVE-2019-0060 – Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets
https://notcve.org/view.php?id=CVE-2019-0060
09 Oct 2019 — The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSec tunnel configurations are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180 ... • https://kb.juniper.net/JSA10959 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2019-0058 – Junos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation.
https://notcve.org/view.php?id=CVE-2019-0058
09 Oct 2019 — A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series. Una vulnerabilidad en el subsistema Veriexec de Juniper Networks Junos OS, permite a un atacante comprometer completamente el ... • https://kb.juniper.net/JSA10956 •

CVE-2019-0055 – Junos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP traffic to a device with SIP ALG enabled.
https://notcve.org/view.php?id=CVE-2019-0055
09 Oct 2019 — A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing SIP ALG traffic. Continued receipt of these valid SIP packets will result in a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D61, 12.... • https://kb.juniper.net/JSA10953 • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVE-2019-0054 – Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates.
https://notcve.org/view.php?id=CVE-2019-0054
09 Oct 2019 — An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected. Una debilidad de Comprobación de Certificado Inapropiada en el cliente de ac... • https://kb.juniper.net/JSA10952 • CWE-295: Improper Certificate Validation CWE-300: Channel Accessible by Non-Endpoint •