Juniper Junos SRX Series for the Data Center Memory Corruption (PSN-2012-04-548)

High Nessus Plugin ID 58877


The remote device has a memory corruption vulnerability.


According to its self-reported version and model number, the version of Junos running on the remote host has a memory corruption vulnerability. When an IPv6 flow session is freed on the Central Point (CP), CP session statistics are updated. In some situations this update results in memory corruption. It is not known if code execution is possible.


Apply the relevant Junos upgrade referenced in Juniper advisory PSN-2012-04-548.

See Also

Plugin Details

Severity: High

ID: 58877

File Name: juniper_psn-2012-04-548.nasl

Version: $Revision: 1.6 $

Type: combined

Published: 2012/04/25

Modified: 2015/08/28

Dependencies: 55932

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/04/11

Vulnerability Publication Date: 2012/04/11

Reference Information

OSVDB: 82821