This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote device is affected by a privilege escalation vulnerability.
According to its self-reported version number, the remote Juniper
Junos device is affected by a heap-based buffer overflow condition in
the sendmsg system call, specifically due to incorrect handling of
arguments in the sockargs() function in sys/kern/uipc_syscalls.c. A
local attacker can exploit this to overwrite large portions of the
kernel memory, resulting in a denial of service condition or the
execution of arbitrary code with elevated privileges.
See also :
Upgrade to the relevant Junos software release referenced in Juniper
security advisory JSA10797.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false