Juniper Junos lo0 Firewall Bypass (PSN-2012-07-651)

high Nessus Plugin ID 59995

Synopsis

The remote router is affected by a firewall bypass vulnerability.

Description

According to its self-reported version number, the remote Junos router has a firewall bypass vulnerability. This issue is present when log or syslog actions are used along with discard within a firewall filter term deployed on the lo0 loopback interface. When the receive rate is very high, some packets will bypass the firewall and be received by the routing engine.

Solution

Apply the relevant Junos upgrade referenced in Juniper advisory PSN-2012-07-651.

See Also

http://www.nessus.org/u?9189960e

Plugin Details

Severity: High

ID: 59995

File Name: juniper_psn-2012-07-651.nasl

Version: 1.8

Type: combined

Published: 7/17/2012

Updated: 8/8/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 7/11/2012

Vulnerability Publication Date: 7/11/2012