This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability due to
improper handling of RSVP PATH messages. A remote attacker can exploit
this issue, by sending a specially crafted RSVP packet, to crash the
Note that this issue only affects devices with support for RSVP
enabled on a network interface.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10652.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false