![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106023 |
Categoría: | JunOS Local Security Checks |
Título: | Juniper Networks Junos OS BFD Crash Vulnerability |
Resumen: | Junos OS is prone to a vulnerability in BFD daemon. |
Descripción: | Summary: Junos OS is prone to a vulnerability in BFD daemon. Vulnerability Insight: Receipt of a specially crafted BFD packet can cause the BFD daemon (bfdd) to crash and restart, generating a bfdd core file. The issue can affect all configurations and topologies utilizing BFD including: single-hop and multi-hop BFD, centralized and distributed mode BFD, micro-BFD and LSP BFD. Note that the bfdd crash can be triggered by a crafted BFD packet even if BFD is not enabled on the interface. Vulnerability Impact: Continuous receipt of crafted BFD packets could result in an extended BFD outage, or in extreme cases could lead to remote code execution. Affected Software/OS: Junos OS 12.1, 12.3, 13.2, 13.3, 14.1, 14.2 and 15.1 Solution: New builds of Junos OS software are available from Juniper. As a workaround and BFD is not used at all, disable the BFD daemon by 'set system processes neighbor-liveness disable' CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5362 http://www.securitytracker.com/id/1032844 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |