First published: Thu Jul 11 2013(Updated: )
flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R8, 12.1 before 12.1R7, and 12.1X44 before 12.1X44-D15 on SRX devices, when PIM and NAT are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted PIM packets, aka PR 842253.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =10.4 | |
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1 | |
Juniper JUNOS | =12.1x44 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4684 is considered a high severity vulnerability as it allows remote attackers to cause a denial of service.
To fix CVE-2013-4684, upgrade the Junos software to a version that is not affected, such as 10.4S14 or later.
CVE-2013-4684 affects several Juniper SRX devices running vulnerable versions of the Junos operating system.
Exploiting CVE-2013-4684 can result in a denial of service due to daemon crashes caused by crafted PIM packets.
Having both PIM and NAT enabled on affected Junos devices increases the risk of exploitation for CVE-2013-4684.