This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability due
to the improper handling of TCP connection transitions to the
LAST_ACK state when the device has more data to send. A remote
attacker can exploit this cause the socket to be stuck in the LAST_ACK
state indefinitely, leading to exhaustion of memory buffers (mbufs)
Note that Nessus has not tested for this issue or the host
configuration but has instead relied only on the application's
self-reported version number.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10686.
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : true