Juniper Junos lo0 Firewall Bypass (PSN-2012-07-651)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote router is affected by a firewall bypass
vulnerability.

Description :

According to its self-reported version number, the remote Junos
router has a firewall bypass vulnerability. This issue is present
when log or syslog actions are used along with discard within a
firewall filter term deployed on the lo0 loopback interface. When the
receive rate is very high, some packets will bypass the firewall and
be received by the routing engine.

See also :

http://www.nessus.org/u?9189960e

Solution :

Apply the relevant Junos upgrade referenced in Juniper advisory
PSN-2012-07-651.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.9
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Junos Local Security Checks

Nessus Plugin ID: 59995 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now