Source : Praetorian Prefect
A report has been received from Juniper at 4:25pm under bulletin PSN-2010-01-623 that a crafted malformed TCP field option in the TCP header of a packet will cause the JUNOS kernel to core (crash). In other words the kernel on the network device (gateway router) will crash and reboot if a packet containing this crafted option is received on a listening TCP port. The JUNOS firewall filter is unable to filter a TCP packet with this issue. Juniper claims this issue as exploit was identified during investigation of a vendor interoperability issue.
There is talk that backbone Internet providers have been quickly patching this issue since yesterday night.
More details at Praetorian Prefect
It is basically all of them. If you’ve installed a device with a JUNOS version released later then 1/28/09, this issue is already corrected. Apparently the original issue and its correction did not conceive of this problem as a security vulnerability, and thus the criticality of applying the patch was not initially understood until this week.
* JUNOS 8.x * JUNOS 9.x * JUNOS 7.x * JUNOS 5.x * JUNOS 6.x * JUNOS 10.x * JUNOS 3.x * JUNOS 4.x