Juniper Junos MPLS DoS (PSN-2012-04-546)

Medium Nessus Plugin ID 58875


The remote router has a denial of service vulnerability.


According to its self-reported version number, the version of Junos running on the remote host has a denial of service vulnerability.
When MPLS is enabled, receiving a high rate of Pseudo Wire (l2vpn or l2circuit) control words from an adjacent node can cause the routing engine (RE) to become overloaded. This could result in an RE switchover, or a reboot in single RE environments.


Apply the relevant Junos upgrade referenced in Juniper advisory PSN-2012-04-546.

See Also

Plugin Details

Severity: Medium

ID: 58875

File Name: juniper_psn-2012-04-546.nasl

Version: $Revision: 1.6 $

Type: combined

Published: 2012/04/25

Modified: 2015/08/28

Dependencies: 55932

Risk Information

Risk Factor: Medium


Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/04/11

Vulnerability Publication Date: 2012/04/11

Reference Information

OSVDB: 82819