Release date:
Updated on:
Affected Systems:
Juniper Networks JUNOS <13.2R2-S2
Juniper Networks JUNOS <13.1R3-S1
Juniper Networks JUNOS <13.3R1
Juniper Networks JUNOS <12.3R5
Juniper Networks JUNOS <12.2R7
Juniper Networks JUNOS <12.1X46-D10
Juniper Networks JUNOS <12.1X45-D20
Juniper Networks JUNOS <12.1X44-D30
Juniper Networks JUNOS <12.1R8-S2
Juniper Networks JUNOS <11.4R10
Juniper Networks JUNOS <10.4R16
Description:
--------------------------------------------------------------------------------
Bugtraq id: 64998
CVE (CAN) ID: CVE-2014-0613
Junos is an application development platform or network operating system used in the Juniper Networks hardware system.
Juniper Junos 10.4R16, 11.4R10, ipv-s2, 12.1X44-D30, 12.1X45-D20, 12.1X46-D10, average, 12.3R5, 13.1R3-S1, 13.2R2-S2, 13.3R1 versions earlier than XNM security Vulnerabilities exist in the implementation of the processor, after xnm-ssl is enabled and xnm-clear-text is enabled, remote attackers can exploit this vulnerability to cause DoS (memory depletion ).
<* Source: vendor
Link: http://osvdb.org/101861
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Juniper Networks
----------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://kb.juniper.net/InfoCenter
Https://kb.juniper.net/JSA10607