Описание
Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote attackers to cause a denial of service (RPD routing daemon crash) via a large number of crafted PIM (S,G) join requests.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00686
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote attackers to cause a denial of service (RPD routing daemon crash) via a large number of crafted PIM (S,G) join requests.
EPSS
Процентиль: 71%
0.00686
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-20