First published: Fri Jul 11 2014(Updated: )
Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D32, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, and 12.1X47 before 12.1X47-D10 on SRX Series devices, when NAT protocol translation from IPv4 to IPv6 is enabled, allows remote attackers to cause a denial of service (flowd hang or crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper JUNOS | =12.1x46 | |
Juniper JUNOS | =12.1x47 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3817 is rated as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2014-3817, upgrade to the recommended Junos software versions 11.4R12 or later for 11.4, and 12.1X44-D32 or later for all 12.1X44 versions.
CVE-2014-3817 affects various SRX Series devices running specific versions of Junos, including SRX100, SRX110, and others listed in the advisory.
CVE-2014-3817 exploits a vulnerability in the NAT protocol translation from IPv4 to IPv6, allowing for potential denial of service conditions.
Yes, patches are available in the recommended software updates that address the vulnerability in CVE-2014-3817.