A Buffer Copy without Checking Size of Input...
High severity
Unreviewed
Published
Oct 9, 2025
to the GitHub Advisory Database
•
Updated Oct 9, 2025
Description
Published by the National Vulnerability Database
Oct 9, 2025
Published to the GitHub Advisory Database
Oct 9, 2025
Last updated
Oct 9, 2025
A Buffer Copy without Checking Size of Input vulnerability in the
Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When memory utilization is high, and specific SIP packets are received, flowd crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this.
This issue affects Junos OS on SRX Series and MX Series:
References