This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote host is affected by multiple buffer overflow
The remote host is running a version of Juniper NetScreen VPN client
that is affected by multiple buffer overflow vulnerabilities :
- The IKE VPN service listening on UDP port 62514 is
vulnerable to a stack overflow vulnerability that can be
triggered by sending specially crafted packets.
- spdedit.exe has a flaw in parsing specially crafted SPD
files that can be utilized to trigger a stack overflow.
Successful exploitation of either of these vulnerabilities could allow a
remote attacker to execute arbitrary code on the host.
See also :
Upgrade to Juniper NetScreen 9.0r5 or higher.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true