cpe:/o:juniper:junos:12.1x46:d40 cpe:/o:juniper:junos:12.1x47 cpe:/o:juniper:junos:12.1x47:d10 cpe:/o:juniper:junos:12.1x47:d15 cpe:/o:juniper:junos:12.1x47:d20 cpe:/o:juniper:junos:12.3x48:d10 cpe:/o:juniper:junos:12.3x48:d15 cpe:/o:juniper:junos:15.1x49:d10 cpe:/o:juniper:junos:15.1x49:d20 CVE-2016-1262 2016-01-15T14:59:09.273-05:00 2016-12-02T22:20:08.150-05:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-01-20T11:52:31.687-05:00 SECTRACK 1035108 CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10721 Juniper Junos OS before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.1X48 before 12.3X48-D20, and 15.1X49 before 15.1X49-D30 on SRX series devices, when the Real Time Streaming Protocol Application Layer Gateway (RTSP ALG) is enabled, allow remote attackers to cause a denial of service (flowd crash) via a crafted RTSP packet.