Juniper JunOS Multiple Vulnerabilities
Last Update Date:
15 Jul 2013 10:39
Release Date:
15 Jul 2013
4157
Views
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities have been identified in Juniper JUNOS. which can be exploited by remote user can obtain potentially sensitive information, cause denial of service conditions or execute arbitrary code.
- A remote user can send specially crafted PIM packets when PIM and NAT are enabled on SRX devices to cause flowd to crash.
- A remote user can send specially crafted HTTP requests when the Captive Portal is enabled with the UAC enforcer role on SRX devices to trigger a buffer overflow and execute arbitrary code on the target system.
- A remote user can send a specially crafted ARP request to trigger a kernel error in certain VLAN configurations with unrestricted arp-resp and proxy-arp settings to cause the target device to crash.
- A remote user can send specially crafted TCP packets when certain Application Layer Gateways are enabled on SRX devices to cause the target flowd daemon to crash.
- A remote user can send specially crafted MSRPC requests when the MSRPC Application Layer Gateway is enabled on SRX devices to cause the target flowd daemon to crash.
- A remote user can obtain potentially sensitive information via Ethernet data packets because the SRX1400, SRX3400, and SRX3600 devices do not properly initialize memory locations when padding Ethernet packets.
Impact
- Denial of Service
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- JunOS prior to versions 10.4S14, 11.4R7, 12.1R6, 12.1X44-D15
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued a fix (10.4S14, 11.4R7, 12.1R6, 12.1X44-D15).
Vulnerability Identifier
Source
Related Link
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10573
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10574
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10576
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10577
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10578
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10579
- http://securitytracker.com/id/1028775
Share with