This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Junos device
has a denial of service vulnerability. Receiving a large number of
specially crafted IPv4 or IPv6 PIM join messages in a Next-Generation
Multicast VPN (NGEN MVPN) environment can cause the routing daemon to
See also :
Apply the relevant Junos upgrade referenced in Juniper advisory
Risk factor :
Medium / CVSS Base Score : 6.3
Family: Junos Local Security Checks
Nessus Plugin ID: 63520 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.