Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106751
Category:JunOS Local Security Checks
Title:Juniper Networks Junos OS ICMPv6 DoS Vulnerability
Summary:Junos OS is prone to a denial of service vulnerability in ICMPv6 PTB;messages.
Description:Summary:
Junos OS is prone to a denial of service vulnerability in ICMPv6 PTB
messages.

Vulnerability Insight:
An issue was discovered in the IPv6 protocol specification, related to
ICMP Packet Too Big (PTB) messages. The security implications of IP fragmentation have been discussed at length
in various RFCs. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of
fragmentation in an arbitrary IPv6 flow and can subsequently perform any type of fragmentation-based attack
against legacy IPv6 nodes that do not implement RFC 6946. However, even nodes that already implement RFC 6946
can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments.

This issue is triggered by ICMPv6 traffic destined to the device. Transit IPv6 traffic will not cause this issue
to occur, and IPv4 is unaffected by this vulnerability.

Vulnerability Impact:
An attacker may cause a denial of service condition.

Affected Software/OS:
Junos OS 12.3X48, 14.1, 14.2, 15.1, 16.1 and 16.2

Solution:
New builds of Junos OS software are available from Juniper.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10142
BugTraq ID: 95797
http://www.securityfocus.com/bid/95797
https://tools.ietf.org/html/draft-ietf-6man-deprecate-atomfrag-generation-08
https://tools.ietf.org/html/rfc8021
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
http://www.securitytracker.com/id/1038256
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.