{"vulnerability": "CVE-2024-39551", "sightings": [{"uuid": "1c06b6ca-7a57-4a86-babe-37cbb05b7bea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39551", "type": "seen", "source": "https://t.me/cvedetector/680", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39551 - An Uncontrolled Resource Consumption vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39551 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of\u00a0 Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an\u00a0unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).\u00a0  \n  \nContinued receipt and processing of these specific packets will sustain the Denial of Service condition.  \n  \nThe memory usage can be monitored using the below command.  \n  \n\u2003\u2003user@host&gt; show usp memory segment sha data objcache jsf\u00a0  \nThis issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:\u00a0  \n  \n  *  \u200320.4 before 20.4R3-S10,\u00a0  \n  *  \u200321.2 before 21.2R3-S6,\u00a0  \n  *  \u200321.3 before 21.3R3-S5,\u00a0  \n  *  \u200321.4 before 21.4R3-S6,\u00a0  \n  *  \u200322.1 before 22.1R3-S4,\u00a0  \n  *  \u200322.2 before 22.2R3-S2,\u00a0  \n  *  \u200322.3 before 22.3R3-S1,\u00a0  \n  *  \u200322.4 before 22.4R3,\u00a0  \n  *  \u200323.2 before 23.2R2. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:54.000000Z"}]}