This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number and configuration, the
remote Juniper Junos device is affected by a denial of service
vulnerability in the rpd daemon due to improper handling of MPLS ping
packets. An unauthenticated, remote attacker can exploit this, via a
specially crafted MPLS ping packet, to crash the rpd daemon.
Note that the device is only vulnerable if MPLS OAM is configured.
See also :
Upgrade to the relevant Junos software release referenced in Juniper
security advisory JSA10795.
Risk factor :
Medium / CVSS Base Score : 6.1