This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability due to
improper handling of BGP UPDATE messages using 4-byte AS numbers. A
remote attacker can exploit this issue, by sending a specially crafted
BGP UPDATE packet, to crash the 'rpd' process.
Note that this issue only affects devices with the BGP daemon enabled
and support for 4-byte AS numbers.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10653.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false