Juniper Junos lo0 Firewall Bypass (PSN-2012-07-651)

High Nessus Plugin ID 59995


The remote router is affected by a firewall bypass vulnerability.


According to its self-reported version number, the remote Junos router has a firewall bypass vulnerability. This issue is present when log or syslog actions are used along with discard within a firewall filter term deployed on the lo0 loopback interface. When the receive rate is very high, some packets will bypass the firewall and be received by the routing engine.


Apply the relevant Junos upgrade referenced in Juniper advisory PSN-2012-07-651.

See Also

Plugin Details

Severity: High

ID: 59995

File Name: juniper_psn-2012-07-651.nasl

Version: $Revision: 1.6 $

Type: combined

Published: 2012/07/17

Modified: 2015/09/22

Dependencies: 55932

Risk Information

Risk Factor: High


Base Score: 7.1

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/07/11

Vulnerability Publication Date: 2012/07/11

Reference Information

OSVDB: 85340