Juniper ScreenOS 5.4 < 5.4.0r28 / 6.2 < 6.2.0r18 / 6.3 < 6.3.0r16 Malformed ICMP Echo Request DoS (JSA10604)

high Nessus Plugin ID 74367

Synopsis

The remote host is affected by a denial of service vulnerability.

Description

The remote host is running a version of Juniper ScreenOS prior to 5.4.0r28 / 6.2.0r18 / 6.3.0r16. It is, therefore, affected by a denial of service vulnerability due to a failure to properly handle ICMP echo request packets.

A remote, unauthenticated attacker could potentially exploit this vulnerability by sending malformed ICMP echo request packets to cause a firewall crash or failover. Repeated exploitation can result in an extended denial of service condition.

Note that the host is not affected if the 'Ping of Death' screen is enabled.

Solution

Upgrade to 5.4.0r28 / 6.2.0r18 / 6.3.0r16 or later or apply the workaround.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10604

https://seclists.org/bugtraq/2014/Jan/73

Plugin Details

Severity: High

ID: 74367

File Name: screenos_JSA10604.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 6/6/2014

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:juniper:screenos

Required KB Items: Host/Juniper/ScreenOS/display_version, Host/Juniper/ScreenOS/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 6/18/2013

Vulnerability Publication Date: 12/11/2013

Reference Information

CVE: CVE-2013-6958

BID: 64260