This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Junos device
has a denial of service vulnerability. Receiving Ethernet packets with
an invalid Ether-type can cause congestion on routers with line cards
installed using Ichip-based FPCs and DPCs. An unauthenticated attacker
on the same subnet could exploit this, causing the router to drop valid
See also :
Apply the relevant Junos upgrade referenced in Juniper advisory
Risk factor :
Medium / CVSS Base Score : 6.1
CVSS Temporal Score : 4.5
Public Exploit Available : false