First published: Tue Apr 15 2014(Updated: )
Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper ScreenOS | <=6.3.0 | |
Juniper ScreenOS | =5.4.0 | |
Juniper ScreenOS | =6.0.0 | |
Juniper ScreenOS | =6.1.0 | |
Juniper ScreenOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2842 has a severity rating that indicates it can lead to a denial of service, causing significant disruptions.
To mitigate CVE-2014-2842, upgrade to Juniper ScreenOS version 6.3.1 or later.
CVE-2014-2842 affects Juniper ScreenOS versions up to and including 6.3.0.
CVE-2014-2842 allows remote attackers to crash and restart or failover the device by sending malformed SSL/TLS packets.
While the best solution is to upgrade, users can implement network monitoring to detect unusual SSL/TLS traffic patterns as a temporary measure.