Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: as-path-prepend and specific length AS_PATH we can cause a JUNOS router to send corrupted UPDATE packets to eBGP neighbors (JSA10418)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: as-path-prepend and specific length AS_PATH we can cause a JUNOS router to send corrupted UPDATE packets to eBGP neighbors (JSA10418)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/01/2010
Created
07/25/2018
Added
05/07/2014
Modified
05/07/2014

Description

Data corruption in a BGP update packet with a long AS_PATH using the as-path-prepend option, could cause the a neighboring eBGP peer to drop the session with an update message error. The number of AS_PATH prepends are excessive (greater than 254), but can happen through normal operational configuration. Given the nature of AS_PATH, the as-path-prepend can be crafted to impact routers several AS hops away from the origin.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;