An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system.
The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are not affected by this vulnerability.
This issue affects Juniper Networks Junos OS on SRX Series:
22.2 versions prior to 22.2R3;
22.3 versions prior to 22.3R2-S1, 22.3R3;
22.4 versions prior to 22.4R1-S2, 22.4R2.
This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA71636 | Vendor Advisory |
https://supportportal.juniper.net/JSA71636 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportportal.juniper.net/JSA71636 - Vendor Advisory |
Information
Published : 2023-07-14 15:15
Updated : 2024-11-21 08:10
NVD link : CVE-2023-36831
Mitre link : CVE-2023-36831
CVE.ORG link : CVE-2023-36831
JSON object : View
Products Affected
juniper
- srx240h2
- srx5600
- srx1500
- srx220
- srx240
- srx650
- csrx
- srx380
- srx550m
- srx5400
- srx3600
- srx4200
- srx210
- srx3400
- srx110
- srx550_hm
- srx100
- vsrx
- srx345
- srx340
- srx550
- srx1400
- junos
- srx4100
- srx320
- srx4600
- srx240m
- srx5800
- srx300
- srx5000
- srx4000
CWE
CWE-703
Improper Check or Handling of Exceptional Conditions