An Improper Encoding or Escaping of Output vulnerability...
Moderate severity
Unreviewed
Published
Apr 9, 2025
to the GitHub Advisory Database
•
Updated Apr 9, 2025
Description
Published by the National Vulnerability Database
Apr 9, 2025
Published to the GitHub Advisory Database
Apr 9, 2025
Last updated
Apr 9, 2025
An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts. This issue does not affect traffic forwarding itself.
This issue affects Junos OS:
This issue does not affected Junos OS Evolved.
References