Juniper Junos IPv6 Neighbor Discovery (ND) Traffic Handling Multiple Vulnerabilities (JSA10749)

Medium Nessus Plugin ID 91762

Synopsis

The remote device is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the remote Juniper Junos device is affected by multiple vulnerabilities :

- A flaw exists due to improper handling of malformed IPv6 ND packets. An unauthenticated, remote attacker can exploit this, via specially crafted ND packets, to cause the device to stop processing IPv6 traffic, resulting in a denial of service condition.

- A flaw exists that is triggered when handling QFX5100 exceptions. An unauthenticated, remote attacker can exploit this to transition IPv6 ND traffic to the routing engine, resulting in a partial denial of service condition.

- An unspecified flaw exists that allows an unauthenticated, remote attacker to cause improper forwarding of IPv6 ND traffic in violation of RFC4861.

Note that Nessus has not tested for these issues but has instead relied only on the device's self-reported model and current configuration.

Solution

Apply the relevant Junos software release referenced in Juniper advisory JSA10749.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10749

Plugin Details

Severity: Medium

ID: 91762

File Name: juniper_jsa10749.nasl

Version: 1.8

Type: combined

Published: 2016/06/22

Updated: 2019/01/02

Dependencies: 55932

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Patch Publication Date: 2017/04/18

Vulnerability Publication Date: 2016/06/03

Reference Information

CVE: CVE-2016-1409

JSA: JSA10749