Juniper ScreenOS 6.3.x < 6.3.0r21 Malformed SSL/TLS Packet DoS (JSA10732)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a denial of service vulnerability.

Description :

The remote host is running a version of Juniper ScreenOS that is 6.3.x
prior to 6.3.0r21. It is, therefore, affected by a denial of service
vulnerability in the administrative web services that is triggered
when handling malformed SSL/TLS packets. An unauthenticated, remote
attacker can exploit this, via a crafted SSL packet, to cause the loss
of administrative access or to reboot the system.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10732
http://www.nessus.org/u?c4eb1929

Solution :

Upgrade to Juniper ScreenOS version 6.3.0r21 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 90708 ()

Bugtraq ID:

CVE ID: CVE-2016-1268

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now