Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Junos TCP Timestamp DoS Vulnerability
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Junos OS is prone to a denial of service vulnerability.
Insight
Insight
By manipulating TCP timestamps within a TCP session to a reachable listening port, it may be possible for an attacker to trigger a persistent buffer/socket resource exhaustion denial of service DoS attack. Normally, a networked device will time out a session after a number of unsuccessful retransmission events, occurring at increasing intervals. However, in this case, a crafted sequence of TCP packets will cause the device to not try to retransmit, allowing the attacker to create sockets that will be long-lived without the need to maintain state on them.
Affected Software
Affected Software
Junos OS 12.1, 12.3, 13.2, 13.3, 14.1, 14.2 and 15.1
Detection Method
Detection Method
Checks if a vulnerable OS build is present on the target host.
Solution
Solution
New builds of Junos OS software are available from Juniper.