This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
The remote device has a memory corruption vulnerability.
According to its self-reported version and model number, the version
of Junos running on the remote host has a memory corruption
vulnerability. When an IPv6 flow session is freed on the Central
Point (CP), CP session statistics are updated. In some situations
this update results in memory corruption. It is not known if code
execution is possible.
See also :
Apply the relevant Junos upgrade referenced in Juniper advisory
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now