Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106021
Kategorie:JunOS Local Security Checks
Titel:Junos RPD NULL Pointer Exception Vulnerability
Zusammenfassung:Junos OS is prone to a NULL pointer exception vulnerability in RPD.
Beschreibung:Summary:
Junos OS is prone to a NULL pointer exception vulnerability in RPD.

Vulnerability Insight:
Upon receipt of a large set of label blocks containing an
updated BGP local preference, RPD may crash with a NULL pointer access exception. The crash was triggered
by a large number of BGP-VPLS advertisements with updated BGP local preference values. Note that this issue
can only be triggered from inside a customer's network. MPLS labels are not usually exchanged outside the
protected network, and are usually only received from a PE or RR in the same network.

Vulnerability Impact:
This vulnerability will crash the RPD daemon leading to a Denial
of Service attack.

Affected Software/OS:
Junos OS 12.1, 12.3, 13.2, 13.3, 14.1 and 14.2

Solution:
New builds of Junos OS software are available from Juniper.

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-5359
http://www.securitytracker.com/id/1032843
CopyrightThis script is Copyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.