Juniper Junos OSPF Protocol Vulnerability (JSA10582)

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Juniper
Junos device has a flaw in its OSPF implementation. A rogue router in
the same autonomous system (AS) could exploit this to control the
routing tables of all other routers in the AS.

Note that this issue does not affect device with one of the following
configurations :

- Interfaces not configured for OSPF

- Passive OSPF interfaces

- OSPF configurations that use MD5 authentication

- OSPF interfaces that block external parties from sending
OSPF link-state update packets

See also :

http://crypto.stanford.edu/seclab/sem-12-13/nakibly.html
https://www.blackhat.com/us-13/archives.html#Nakibly
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10582

Solution :

Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10582.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Junos Local Security Checks

Nessus Plugin ID: 69194 ()

Bugtraq ID: 65169

CVE ID: CVE-2013-0149
CVE-2013-7313

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now