SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Encryption/VPN)  >   Pulse Connect Secure (formerly Juniper Pulse Secure) Vendors:   Juniper
Juniper Pulse Secure TCP Hardware Acceleration Flaw Lets Remote Users Access Data on the Target System
SecurityTracker Alert ID:  1033166
SecurityTracker URL:  http://securitytracker.com/id/1033166
CVE Reference:   CVE-2015-5369   (Links to External Site)
Date:  Aug 1 2015
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Pulse Secure. A remote user can access data communicated by the target system.

On systems with Hardware Acceleration enabled, a remote user can exploit a TCP handshake verification flaw to, in combination with a separate vulnerability, gain man-in-the-middle access to the data communicated by the target system.

Yngve N. Pettersen of TLS Prober Labs reported this vulnerability.

Impact:   A remote user can, in combination with a separate vulnerability, access data communicated by the target system.
Solution:   The vendor plans to issue a fix (7.1r22.2, 8.0r13, 8.1r5).

The vendor's advisory is available at:

http://kb.juniper.net/InfoCenter/index?page=content&id=TSB16756

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=TSB16756 (Links to External Site)
Cause:   Access control error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC