![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.105917 |
Categoría: | JunOS Local Security Checks |
Título: | Juniper Networks Junos OS IPv6 to IPv4 Translating Denial of Service Vulnerability |
Resumen: | DoS when translating from IPv6 to IPv4. |
Descripción: | Summary: DoS when translating from IPv6 to IPv4. Vulnerability Insight: A denial of service (DoS) issue has been discovered in Juniper SRX Series products that can be exploited by remote unauthenticated attackers. This issue takes place when a certain malformed packet is translated from IPv6 to IPv4. When this malformed packet is sent to a vulnerable SRX Series device, the flowd process may crash. Vulnerability Impact: Unauthenticated attackers can cause a DoS condition by repeatedly exploiting this vulnerability. Affected Software/OS: Junos OS 11.4, 12.1, 12.1X44, 12.1X45 and 12.1X46. Solution: New builds of Junos OS software are available from Juniper. As a workaround disable NAT translation from IPv6 to IPv4 if not required. CVSS Score: 5.4 CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-3822 http://www.securitytracker.com/id/1030560 |
Copyright | Copyright (C) 2014 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |