![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.103960 |
Categoría: | JunOS Local Security Checks |
Título: | Juniper Networks Junos OS PIM Handling DoS Vulnerability |
Resumen: | Certain PIM packets subject to NAT may cause the Flow Daemon to;crash which can cause a DoS condition. |
Descripción: | Summary: Certain PIM packets subject to NAT may cause the Flow Daemon to crash which can cause a DoS condition. Vulnerability Insight: On SRX Series devices where Protocol-Independent Multicast (PIM) is enabled, certain PIM packets subject to Network Address Translation (NAT) may cause the Flow Daemon (flowd) to crash. This issue only occurs in a NAT environment and cannot be triggered by PIM packets sent directly to the SRX. Vulnerability Impact: A remote attacker can crash the Flow Daemon and by doing this repeatedly causing a denial of service condition. Affected Software/OS: Junos OS 10.4, 11.4, 12.1 and 12.1X44. Solution: New builds of Junos OS software are available from Juniper. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-4684 BugTraq ID: 61127 http://www.securityfocus.com/bid/61127 http://osvdb.org/95107 http://secunia.com/advisories/54157 |
Copyright | Copyright (C) 2013 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |