First published: Fri Jul 11 2014(Updated: )
Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R10, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8, 12.3 before 12.3R7, 13.1 before 13.1R4, 13.2 before 13.2R4, 13.3 before 13.3R2, and 14.1 before 14.1R1, when Auto-RP is enabled, allows remote attackers to cause a denial of service (RDP routing process crash and restart) via a malformed PIM packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | =11.4 | |
Juniper Junos | =12.1 | |
Juniper Junos | =12.1x44 | |
Juniper Junos | =12.1x45 | |
Juniper Junos | =12.1x46 | |
Juniper Junos | =12.1x47 | |
Juniper Junos | =12.2 | |
Juniper Junos | =12.3 | |
Juniper Junos | =13.1 | |
Juniper Junos | =13.2 | |
Juniper Junos | =13.3 | |
Juniper Junos | =14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3819 is considered a high severity vulnerability due to its potential to allow attackers to gain unauthorized access to sensitive data.
To fix CVE-2014-3819, update your Junos firmware to a version that is not affected, such as 11.4R12 or later, or the patched releases for 12.1, 12.2, 12.3, 13.1, 13.2, 13.3, and 14.1.
CVE-2014-3819 affects Junos versions prior to 11.4R12, 12.1R10, various 12.1X series, 12.2R8, 12.3R7, 13.1R4, 13.2R4, 13.3R2, and 14.1R1.
CVE-2014-3819 impacts devices running specific versions of Juniper's Junos operating system.
There is no official workaround for CVE-2014-3819; upgrading to a non-affected version is the recommended mitigation.