Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: SNMP Vulnerabilities (JSA10303)

Back to Search

Juniper Junos OS: SNMP Vulnerabilities (JSA10303)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/05/2002
Created
07/25/2018
Added
05/07/2014
Modified
05/07/2014

Description

CERT Advisory CA-2002-03 describes a series of tests designed to determine the vulnerability of SNMP implementations. Juniper Networks has evaluated its software using the provided test suites, and has determined that, with one exception, the JUNOS Internet software is not vulnerable to any of the potential exploits. The only vulnerability found occurred when SNMP PDU tracing was enabled (snmp traceoptions flag pdu). With this trace flag enabled, certain invalid SNMP varbinds can cause the SNMP process to overflow a buffer and terminate. Although one could theoretically use this buffer overflow to gain root access to the router, no known exploit code exists.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;