Juniper ScreenOS 6.3 < 6.3.0r17 IPv6 Packet DoS

high Nessus Plugin ID 76280

Synopsis

The remote host is affected by a denial of service vulnerability.

Description

The remote host is running a version of Juniper ScreenOS 6.3 prior to 6.3.0r17. It is, therefore, affected by a denial of service vulnerability.

A denial of service flaw exists when handling a specially crafted IPv6 packet sequence. This could allow a remote attacker to cause the device to crash or reboot, and repeated exploitation can result in an extended denial of service condition.

Solution

Upgrade to 6.3.0r17 or later.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632

Plugin Details

Severity: High

ID: 76280

File Name: screenos_JSA10632.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 6/27/2014

Updated: 7/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:juniper:screenos

Required KB Items: Host/Juniper/ScreenOS/display_version, Host/Juniper/ScreenOS/version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/11/2014

Vulnerability Publication Date: 6/11/2014

Reference Information

CVE: CVE-2014-3814

BID: 68099, 68100

IAVB: 2014-B-0082