Juniper Junos MPLS DoS (PSN-2012-04-546)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote router has a denial of service vulnerability.

Description :

According to its self-reported version number, the version of Junos
running on the remote host has a denial of service vulnerability.
When MPLS is enabled, receiving a high rate of Pseudo Wire (l2vpn or
l2circuit) control words from an adjacent node can cause the routing
engine (RE) to become overloaded. This could result in an RE
switchover, or a reboot in single RE environments.

See also :

http://www.nessus.org/u?e80736ee

Solution :

Apply the relevant Junos upgrade referenced in Juniper advisory
PSN-2012-04-546.

Risk factor :

Medium / CVSS Base Score : 5.4
(CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 4.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Junos Local Security Checks

Nessus Plugin ID: 58875 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now