Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Junos TCP Timestamp DoS Vulnerability

Information

Severity

Severity

High

Family

Family

JunOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

Junos OS is prone to a denial of service vulnerability.

Insight

Insight

By manipulating TCP timestamps within a TCP session to a reachable listening port, it may be possible for an attacker to trigger a persistent buffer/socket resource exhaustion denial of service DoS attack. Normally, a networked device will time out a session after a number of unsuccessful retransmission events, occurring at increasing intervals. However, in this case, a crafted sequence of TCP packets will cause the device to not try to retransmit, allowing the attacker to create sockets that will be long-lived without the need to maintain state on them.

Affected Software

Affected Software

Junos OS 12.1, 12.3, 13.2, 13.3, 14.1, 14.2 and 15.1

Detection Method

Detection Method

Checks if a vulnerable OS build is present on the target host.

Solution

Solution

New builds of Junos OS software are available from Juniper.

Common Vulnerabilities and Exposures (CVE)