Juniper Junos rpd BGP add-path DoS (JSA10771)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote device is affected by a denial of service vulnerability.

Description :

According to its self-reported version number and configuration, the
remote Juniper Junos device is affected by a denial of service
vulnerability in the routing process daemon (rpd) due to improper
handling of BGP packets. An unauthenticated, remote attacker can
exploit this issue, by sending specially crafted BGP packets, to
cause the rdp daemon to crash and restart.

Note that this vulnerability only affects devices configured with the
BGP add-path feature enabled with the 'send' option or with both the
'send' and 'receive' options.

Nessus has not tested for this issue but has instead relied only on
the device's self-reported version and current configuration.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10771

Solution :

Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10771.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Junos Local Security Checks

Nessus Plugin ID: 96660 ()

Bugtraq ID: 95394

CVE ID: CVE-2017-2302

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now