Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: Remotely exploitable ICMPv6 denial-of-service (DoS) attack (JSA10334)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: Remotely exploitable ICMPv6 denial-of-service (DoS) attack (JSA10334)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/01/2004
Created
07/25/2018
Added
05/07/2014
Modified
05/07/2014

Description

When an incoming IPv6 packet requires the router to generate an ICMPv6 response, the response might not be generated and the buffer containing the original packet might not be released. Eventually the Packet Forwarding Engine CPU might exhaust its packet memory and reboot. This problem exists in all JUNOS Release 6.x software built between February 24 and June 19, 2004 (inclusive) running on M-series and T-series routing platforms.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;