Juniper ScreenOS 6.3 < 6.3.0r17 IPv6 Packet DoS

High Nessus Plugin ID 76280


The remote host is affected by a denial of service vulnerability.


The remote host is running a version of Juniper ScreenOS 6.3 prior to 6.3.0r17. It is, therefore, affected by a denial of service vulnerability.

A denial of service flaw exists when handling a specially crafted IPv6 packet sequence. This could allow a remote attacker to cause the device to crash or reboot, and repeated exploitation can result in an extended denial of service condition.


Upgrade to 6.3.0r17 or later.

See Also

Plugin Details

Severity: High

ID: 76280

File Name: screenos_JSA10632.nasl

Version: $Revision: 1.2 $

Type: local

Family: Firewalls

Published: 2014/06/27

Modified: 2014/06/28

Dependencies: 74148

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:screenos

Required KB Items: Host/Juniper/ScreenOS/display_version, Host/Juniper/ScreenOS/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/06/11

Vulnerability Publication Date: 2014/06/11

Reference Information

CVE: CVE-2014-3814

BID: 68099, 68100

OSVDB: 107998

IAVB: 2014-B-0082