Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: Crafted RSVP Path Object Overloads the RPD Process (JSA10417)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: Crafted RSVP Path Object Overloads the RPD Process (JSA10417)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/01/2010
Created
07/25/2018
Added
05/07/2014
Modified
05/07/2014

Description

A crafted RSVP Path Object overloads the routing protocol daemon (RPD) process when received by a JUNOS Router. The crafted packet triggers a flaw which consumes close to 100% of the RE CPU time. The RPD process becomes unresponsive to commands via the management console, and all routing protocol updates are not processed (resulting on in all the routing protocols to drop their sessions). The RPD process does not recover on its own, requiring manual intervention.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;