First published: Fri Jan 16 2015(Updated: )
The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =13.3-r3 | |
Juniper JUNOS | =13.3-r4 | |
Juniper JUNOS | =13.3-r5 | |
Juniper JUNOS | =14.1 | |
Juniper JUNOS | =14.1-r1 | |
Juniper JUNOS | =14.1-r2 | |
Juniper JUNOS | =14.1-r3 | |
Juniper JUNOS | =14.2 | |
Juniper JUNOS | =14.2-r1 | |
Juniper Mx10 | ||
Juniper Mx104 | ||
Juniper Mx2010 | ||
Juniper Mx2020 | ||
Juniper Mx240 | ||
Juniper Mx40 | ||
Juniper Mx480 | ||
Juniper Mx80 | ||
Juniper Mx960 | ||
Juniper Vmx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.