SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos Fragmented Packet Processing Flaw Lets Local Users Consume Excessive Buffer Memory Resources
SecurityTracker Alert ID:  1033853
SecurityTracker URL:  http://securitytracker.com/id/1033853
CVE Reference:   CVE-2014-6449   (Links to External Site)
Date:  Oct 16 2015
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Junos. A local user can consume excessive buffer memory on the target system.

A local user can supply specially crafted fragmented packets to the target device to consume all available buffer resources on the target system and deny service for connections to the target device. Transit connections through the target device are not affected.

Impact:   A local user can consume excessive buffer memory resources on the target system.
Solution:   The vendor has issued a fix (12.1X44-D50, 12.1X46-D35, 12.1X47-D25, 12.3R10, 12.3X48-D15, 13.2R8, 13.3R7, 14.1R5, 14.2R1).

The vendor's advisory is available at:

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10696

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10696 (Links to External Site)
Cause:   Resource error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC