Juniper Junos for M/MX Series Routers IPv6 Neighbor Discovery DoS (JSA10786)

medium Nessus Plugin ID 99527

Synopsis

The remote device is affected by a denial of service vulnerability.

Description

According to its self-reported version and configuration, the remote Juniper Junos M/MX Series device is affected by a denial of service vulnerability in a Packet Forwarding Engine (PFE) when processing IPv6 neighbor discovery (ND) packets that originate from subscribers and are destined to M/MX series routers that are configured with Enhanced Subscriber Management for DHCPv6 subscribers. An unauthenticated, adjacent attacker can exploit this to cause the PFE to hang or crash.
Note that this issue only affects devices whose system configuration contains 'subscriber-management enable force'. Furthermore, devices with only IPv4 configured are not affected.

Nessus has not tested for this issue but has instead relied only on the device's self-reported version and current configuration.

Solution

Apply the relevant Junos software release or workaround referenced in Juniper advisory JSA10786.

See Also

http://www.nessus.org/u?3c1c5682

Plugin Details

Severity: Medium

ID: 99527

File Name: juniper_jsa10786.nasl

Version: 1.5

Type: combined

Published: 4/20/2017

Updated: 8/10/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Low

Base Score: 3.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Settings/ParanoidReport, Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 4/12/2017

Vulnerability Publication Date: 4/12/2017

Reference Information

CVE: CVE-2017-2340

BID: 97607

JSA: JSA10786