Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: BGP Malformed AS-4 Byte Transitive Attributes Drop BGP Sessions (JSA10422)

Back to Search

Juniper Junos OS: BGP Malformed AS-4 Byte Transitive Attributes Drop BGP Sessions (JSA10422)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/01/2010
Created
07/25/2018
Added
05/07/2014
Modified
05/07/2014

Description

Several issues with JUNOS sending and receiving malformed BGP 4-Byte transitive attributes have been seen operationally on the Internet. JUNOS routers which receive these malformed attributes will strictly comply with the BGP specs and drop the BGP session. This issue has been previously addressed a prior Security Advisory - PSN-2009-01-200 (BGP Session Teardown due to AS_CONFED_SEQUENCE in AS4_PATH). This Security Advisory provides an update and further details from an extensive audit to remediate this issue.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;