Juniper Junos IPv6 Neighbor Discovery (ND) Traffic Handling Multiple Vulnerabilities (JSA10749)

medium Nessus Plugin ID 91762

Synopsis

The remote device is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the remote Juniper Junos device is affected by multiple vulnerabilities :

- A flaw exists due to improper handling of malformed IPv6 ND packets. An unauthenticated, remote attacker can exploit this, via specially crafted ND packets, to cause the device to stop processing IPv6 traffic, resulting in a denial of service condition.

- A flaw exists that is triggered when handling QFX5100 exceptions. An unauthenticated, remote attacker can exploit this to transition IPv6 ND traffic to the routing engine, resulting in a partial denial of service condition.

- An unspecified flaw exists that allows an unauthenticated, remote attacker to cause improper forwarding of IPv6 ND traffic in violation of RFC4861.

Note that Nessus has not tested for these issues but has instead relied only on the device's self-reported model and current configuration.

Solution

Apply the relevant Junos software release referenced in Juniper advisory JSA10749.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10749

Plugin Details

Severity: Medium

ID: 91762

File Name: juniper_jsa10749.nasl

Version: 1.8

Type: combined

Published: 6/22/2016

Updated: 1/2/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 4/18/2017

Vulnerability Publication Date: 6/3/2016

Reference Information

CVE: CVE-2016-1409

JSA: JSA10749