ID

VAR-201307-0477


CVE

CVE-2013-4687


TITLE

Juniper Networks SRX Runs on the device Junos of flowd Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-003334

DESCRIPTION

flowd in Juniper Junos 10.4 before 10.4S14, 11.2 and 11.4 before 11.4R6-S2, and 12.1 before 12.1R6 on SRX devices, when certain Application Layer Gateways (ALGs) are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets, aka PRs 727980, 806269, and 835593. Juniper Networks Junos is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause the host system to crash, resulting in a denial-of-service condition. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in flowd in Juniper Junos 10.4 prior to 10.4S14, 11.4 prior to 11.2 and 11.4R6-S2, and 12.1 prior to 12.1R6 on SRX Series Server Gateway devices

Trust: 1.98

sources: NVD: CVE-2013-4687 // JVNDB: JVNDB-2013-003334 // BID: 61122 // VULHUB: VHN-64689

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:12.1

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:11.4

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:11.2

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:10.4

Trust: 1.9

vendor:junipermodel:srx3600scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx100scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx240scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx550scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx210scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx110scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx1400scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx3400scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx650scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx220scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx5800scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx5600scope:eqversion: -

Trust: 1.0

vendor:junipermodel:srx3400scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:10.4

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:11.4

Trust: 0.8

vendor:junipermodel:srx210scope: - version: -

Trust: 0.8

vendor:junipermodel:srx650scope: - version: -

Trust: 0.8

vendor:junipermodel:srx550scope: - version: -

Trust: 0.8

vendor:junipermodel:srx5800scope: - version: -

Trust: 0.8

vendor:junipermodel:srx100scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1r6

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:11.4r6-s2

Trust: 0.8

vendor:junipermodel:srx220scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:10.4s14

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:11.2

Trust: 0.8

vendor:junipermodel:srx5600scope: - version: -

Trust: 0.8

vendor:junipermodel:srx110scope: - version: -

Trust: 0.8

vendor:junipermodel:srx240scope: - version: -

Trust: 0.8

vendor:junipermodel:srx1400scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:11.4

Trust: 0.8

vendor:junipermodel:srx3600scope: - version: -

Trust: 0.8

vendor:junipermodel:srx650scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx5800scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx5600scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx550scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx3600scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx3400scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx240scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx220scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx210scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx1400scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx110scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx100scope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1r6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r6-s2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 10.4s14scope:neversion: -

Trust: 0.3

sources: BID: 61122 // JVNDB: JVNDB-2013-003334 // CNNVD: CNNVD-201307-231 // NVD: CVE-2013-4687

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4687
value: HIGH

Trust: 1.0

NVD: CVE-2013-4687
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201307-231
value: HIGH

Trust: 0.6

VULHUB: VHN-64689
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-4687
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-64689
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-64689 // JVNDB: JVNDB-2013-003334 // CNNVD: CNNVD-201307-231 // NVD: CVE-2013-4687

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-4687

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201307-231

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201307-231

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003334

PATCH

title:JSA10577url:http://kb.juniper.net/JSA10577

Trust: 0.8

sources: JVNDB: JVNDB-2013-003334

EXTERNAL IDS

db:NVDid:CVE-2013-4687

Trust: 2.8

db:JUNIPERid:JSA10577

Trust: 2.0

db:BIDid:61122

Trust: 1.4

db:JVNDBid:JVNDB-2013-003334

Trust: 0.8

db:CNNVDid:CNNVD-201307-231

Trust: 0.7

db:VULHUBid:VHN-64689

Trust: 0.1

sources: VULHUB: VHN-64689 // BID: 61122 // JVNDB: JVNDB-2013-003334 // CNNVD: CNNVD-201307-231 // NVD: CVE-2013-4687

REFERENCES

url:http://kb.juniper.net/jsa10577

Trust: 1.7

url:http://www.securityfocus.com/bid/61122

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4687

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4687

Trust: 0.8

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10577&actp=rss

Trust: 0.3

url:http://www.juniper.net/

Trust: 0.3

sources: VULHUB: VHN-64689 // BID: 61122 // JVNDB: JVNDB-2013-003334 // CNNVD: CNNVD-201307-231 // NVD: CVE-2013-4687

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 61122

SOURCES

db:VULHUBid:VHN-64689
db:BIDid:61122
db:JVNDBid:JVNDB-2013-003334
db:CNNVDid:CNNVD-201307-231
db:NVDid:CVE-2013-4687

LAST UPDATE DATE

2024-11-23T22:49:34.681000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-64689date:2013-08-22T00:00:00
db:BIDid:61122date:2013-07-11T00:00:00
db:JVNDBid:JVNDB-2013-003334date:2013-07-16T00:00:00
db:CNNVDid:CNNVD-201307-231date:2013-07-12T00:00:00
db:NVDid:CVE-2013-4687date:2024-11-21T01:56:03.977

SOURCES RELEASE DATE

db:VULHUBid:VHN-64689date:2013-07-11T00:00:00
db:BIDid:61122date:2013-07-11T00:00:00
db:JVNDBid:JVNDB-2013-003334date:2013-07-16T00:00:00
db:CNNVDid:CNNVD-201307-231date:2013-07-12T00:00:00
db:NVDid:CVE-2013-4687date:2013-07-11T14:55:01.387