First published: Sat Jan 11 2014(Updated: )
Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =10.4 | |
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1r | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0618 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2014-0618, upgrade your Junos OS to a version that is not vulnerable, specifically versions 10.4R16, 11.4R8, 12.1R7, 12.1X44-D20, or 12.1X45-D10 and later.
The affected devices include Juniper SRX Series service gateways running specific versions of Junos OS.
Yes, CVE-2014-0618 can be exploited remotely by attackers, leading to a crash of the flowd process.
CVE-2014-0618 can lead to a denial of service, impacting network availability and performance.