2 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Juniper JunosE before 13.3.3p0-1, 14.x before 14.3.2, and 15.x before 15.1.0, when DEBUG severity icmpTraffic logging is enabled, allows remote attackers to cause a denial of service (SRP reset) via a crafted ICMP packet to the (1) interface or (2) loopback IP address, which triggers a processor exception in ip_RxData_8. Juniper JunosE anterior a 13.3.3p0-1, 14.x anterior a 14.3.2, y 15.x anterior a 15.1.0, cuando el registro DEBUG severity icmpTraffic está configurado, permite a atacantes remotos causar una denegación de servicio (restablecimiento de SRP) a través de un paquete ICMP manipulado en (1) la interfaz o (2) la dirección IP del bucle de retorno, lo que provoca una excepción del procesador en ip_RxData_8. • http://www.securityfocus.com/bid/70368 http://www.securitytracker.com/id/1031006 https://exchange.xforce.ibmcloud.com/vulnerabilities/96907 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10651 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 23%CPEs: 8EXPL: 0

The Internet Key Exchange version 1 (IKEv1) implementation in Juniper JUNOS and JUNOSe software for M, T, and J-series routers before release 6.4, and E-series routers before 7-1-0, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to. • http://jvn.jp/niscc/NISCC-273756/index.html http://secunia.com/advisories/17568 http://securitytracker.com/id?1015203 http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.kb.cert.org/vuls/id/226364 http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en http://www.securityfocus.com/bid/15402 http://www.vupen.com/english/advisories/2005/2410 •