Juniper Junos Fragmented TCP Packet Sequence Handling DoS (JSA10696)
Medium Nessus Plugin ID 86475
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionAccording to its self-reported version number, the remote Juniper Junos device is affected by a denial of service vulnerability due to improper TCP packet reassembly. An unauthenticated, remote attacker can exploit this, via a specially crafted sequence of fragmented packets, to consume all available buffers, resulting in a denial of service condition.
SolutionApply the relevant Junos software release referenced in Juniper advisory JSA10696.