Juniper Junos LAST_ACK State DoS (JSA10686)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability due
to the improper handling of TCP connection transitions to the
LAST_ACK state when the device has more data to send. A remote
attacker can exploit this cause the socket to be stuck in the LAST_ACK
state indefinitely, leading to exhaustion of memory buffers (mbufs)
and connections.

Note that Nessus has not tested for this issue or the host
configuration but has instead relied only on the application's
self-reported version number.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686

Solution :

Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10686.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.2
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Junos Local Security Checks

Nessus Plugin ID: 85226 ()

Bugtraq ID: 75731

CVE ID: CVE-2015-5358

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now