Juniper NetScreen VPN Client Multiple Buffer Overflow Vulnerabilities

Critical Nessus Plugin ID 70121


The remote host is affected by multiple buffer overflow vulnerabilities.


The remote host is running a version of Juniper NetScreen VPN client that is affected by multiple buffer overflow vulnerabilities :

- The IKE VPN service listening on UDP port 62514 is vulnerable to a stack overflow vulnerability that can be triggered by sending specially crafted packets.

- spdedit.exe has a flaw in parsing specially crafted SPD files that can be utilized to trigger a stack overflow.

Successful exploitation of either of these vulnerabilities could allow a remote attacker to execute arbitrary code on the host.


Upgrade to Juniper NetScreen 9.0r5 or higher.

See Also

Plugin Details

Severity: Critical

ID: 70121

File Name: juniper_netscreen_jsa10429.nasl

Version: $Revision: 1.8 $

Type: local

Agent: windows

Family: Windows

Published: 2013/09/25

Modified: 2017/07/13

Dependencies: 70120

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:juniper:netscreen_remote_vpn_client

Required KB Items: SMB/Juniper NetScreen/Path, SMB/Juniper NetScreen/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/01/27

Vulnerability Publication Date: 2009/06/01

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (SafeNet SoftRemote GROUPNAME Buffer Overflow)

ExploitHub (EH-12-164)

Reference Information

CVE: CVE-2009-1943, CVE-2009-3861

BID: 35154, 36907

OSVDB: 54831, 59660

CWE: 119