Juniper ScreenOS 6.3 < 6.3.0r17 DoS

high Nessus Plugin ID 74149

Synopsis

The remote host is affected by a denial of service vulnerability.

Description

The remote host is running a version of Juniper ScreenOS 6.3 prior to 6.3.0r17. It is, therefore, affected by a denial of service vulnerability due to a failure to properly handle SSL/TLS protocol packets.

A remote, unauthenticated attacker could potentially exploit this vulnerability by sending malformed SSL/TLS packets to cause a firewall crash or failover. Repeated exploitation can result in an extended denial of service condition.

Solution

Upgrade to 6.3.0r17 or later.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10624

Plugin Details

Severity: High

ID: 74149

File Name: screenos_JSA10624.nasl

Version: 1.5

Type: local

Family: Firewalls

Published: 5/23/2014

Updated: 7/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:juniper:screenos

Required KB Items: Settings/ParanoidReport, Host/Juniper/ScreenOS/display_version, Host/Juniper/ScreenOS/version

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 4/15/2014

Reference Information

CVE: CVE-2014-2842

BID: 66802

CERT: 480428