Juniper Junos SRX1400/3400/3600 Etherleak Information Disclosure (JSA10579)

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Junos device
has an information disclosure vulnerability. SRX1400, SRX3400, and
SRX3600 services gateways pad Ethernet packets with data from previous
packets instead of padding them with null bytes. A remote,
unauthenticated attacker could exploit this to gain access to sensitive
information, which could be used to mount further attacks.

See also :

https://lkml.org/lkml/2002/4/27/101
http://blog.spoofed.org/2007/03/etherleak-old-dog-old-tricks.html
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10579

Solution :

Apply the relevant Junos upgrade referenced in Juniper advisory
JSA10579.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.8
(CVSS2#E:F/RL:ND/RC:ND)
Public Exploit Available : true

Family: Junos Local Security Checks

Nessus Plugin ID: 68912 ()

Bugtraq ID: 6535
61123

CVE ID: CVE-2003-0001
CVE-2013-4690

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now