CVE-2014-6382CVE-2014-6382

Affected configuration(s):

cpe:/o:juniper:junos:13.3:r3
cpe:/o:juniper:junos:13.3:r4
cpe:/o:juniper:junos:13.3:r5
cpe:/o:juniper:junos:14.1
cpe:/o:juniper:junos:14.1:r1
cpe:/o:juniper:junos:14.1:r2
cpe:/o:juniper:junos:14.1:r3
cpe:/o:juniper:junos:14.2
cpe:/o:juniper:junos:14.2:r1

Date published: 2015-01-16T11:59:02.967-05:00

Date last modified: 2015-02-04T00:03:08.350-05:00

CVSS Score: 7.1

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www.securityfocus.com/bid/72070

Summary: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.