First published: Mon Oct 19 2015(Updated: )
The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a crafted L2TP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetScreen ScreenOS | <=6.3.0 | |
NetScreen ScreenOS | =6.3.0 | |
NetScreen ScreenOS | =6.3.0-r14 | |
NetScreen ScreenOS | =6.3.0-r15 | |
NetScreen ScreenOS | =6.3.0-r16 | |
NetScreen ScreenOS | =6.3.0-r17 | |
NetScreen ScreenOS | =6.3.0-r18 | |
NetScreen ScreenOS | =6.3.0-r19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7750 has been rated as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2015-7750, upgrade your Juniper ScreenOS device to version 6.3.0r19 or later.
CVE-2015-7750 affects Juniper Netscreen and ScreenOS Firewall products with ScreenOS versions prior to 6.3.0r19.
Yes, CVE-2015-7750 can be exploited remotely by sending crafted L2TP packets to the vulnerable device.
Exploiting CVE-2015-7750 can lead to a denial of service, rendering the affected device inoperable.