Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10649)

High Nessus Plugin ID 78420


The remote device is missing a vendor-supplied security patch.


According to its self-reported version number, the remote Junos device is affected by multiple vulnerabilities in the implementation of OpenSSL :

- An error exists related to 'ec point format extension' handling and multithreaded clients that allows freed memory to be overwritten during a resumed session.

- An error exists related to handling fragmented 'ClientHello' messages that allows a man-in-the-middle attacker to force usage of TLS 1.0 regardless of higher protocol levels being supported by both the server and the client. (CVE-2014-3511)

- A buffer overflow error exists related to handling Secure Remote Password protocol (SRP) parameters having unspecified impact. (CVE-2014-3512)

- A NULL pointer dereference error exists related to handling Secure Remote Password protocol (SRP) that allows a malicious server to crash a client, resulting in a denial of service. (CVE-2014-5139)

Note that these issues only affects devices with J-Web or the SSL service for JUNOScript enabled.


Apply the relevant Junos software release or workaround referenced in Juniper advisory JSA10649.

See Also

Plugin Details

Severity: High

ID: 78420

File Name: juniper_jsa10649.nasl

Version: 1.8

Type: combined

Published: 2014/10/14

Modified: 2017/05/16

Dependencies: 55932

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/10/08

Vulnerability Publication Date: 2014/08/06

Reference Information

CVE: CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139

BID: 69077, 69079, 69083, 69084

OSVDB: 109896, 109897, 109898, 109902

JSA: JSA10649