ID

VAR-201310-0398


CVE

CVE-2013-6015


TITLE

Juniper Networks SRX Runs on the series service gateway Junos Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-004806

DESCRIPTION

Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets. Juniper Networks Junos is prone to a remote denial-of-service vulnerability. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. Note: To exploit this issue, attackers require a plugin (e.g. ALGs, UTM) configured to use a TCP proxy. The operating system provides a secure programming interface and Junos SDK. A denial of service vulnerability exists in Juniper Junos running on SRX Series Services Gateway devices. The following versions are affected: Junos 10.4 and earlier, 11.4, 12.1, 12.1X44, 12.1X45

Trust: 1.98

sources: NVD: CVE-2013-6015 // JVNDB: JVNDB-2013-004806 // BID: 62963 // VULHUB: VHN-66017

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:9.4

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:9.0

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.2

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:9.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:9.5

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:9.2

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.4

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:9.6

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x45

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:12.1

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:11.4

Trust: 1.3

vendor:junipermodel:junosscope:eqversion:4.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:6.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:4.0

Trust: 1.0

vendor:junipermodel:junosscope:lteversion:10.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:4.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:6.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:8.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.7

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:8.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:4.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.5

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.6

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:6.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:4.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:6.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:6.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.6

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.5

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.0

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:5.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:7.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:10.4

Trust: 0.9

vendor:junipermodel:junos osscope:ltversion:12.1x44

Trust: 0.8

vendor:junipermodel:srx3400scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:11.4r5-s2

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x44-d20

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:11.4

Trust: 0.8

vendor:junipermodel:srx210scope: - version: -

Trust: 0.8

vendor:junipermodel:srx650scope: - version: -

Trust: 0.8

vendor:junipermodel:srx550scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1r3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x45-d15

Trust: 0.8

vendor:junipermodel:srx5800scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x45

Trust: 0.8

vendor:junipermodel:srx100scope: - version: -

Trust: 0.8

vendor:junipermodel:srx220scope: - version: -

Trust: 0.8

vendor:junipermodel:srx5600scope: - version: -

Trust: 0.8

vendor:junipermodel:srx110scope: - version: -

Trust: 0.8

vendor:junipermodel:srx240scope: - version: -

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1r

Trust: 0.8

vendor:junipermodel:srx1400scope: - version: -

Trust: 0.8

vendor:junipermodel:srx3600scope: - version: -

Trust: 0.8

vendor:junipermodel:srx650scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx5800scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx5600scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx3600scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx3400scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx240scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx210scope:eqversion:0

Trust: 0.3

vendor:junipermodel:srx100scope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x45-d15scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r6.6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 11.4r5-s2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 10.4s14scope:neversion: -

Trust: 0.3

sources: BID: 62963 // JVNDB: JVNDB-2013-004806 // CNNVD: CNNVD-201310-258 // NVD: CVE-2013-6015

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6015
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6015
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201310-258
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66017
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6015
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-66017
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66017 // JVNDB: JVNDB-2013-004806 // CNNVD: CNNVD-201310-258 // NVD: CVE-2013-6015

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-66017 // JVNDB: JVNDB-2013-004806 // NVD: CVE-2013-6015

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-258

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201310-258

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004806

PATCH

title:JSA10596url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10596

Trust: 0.8

sources: JVNDB: JVNDB-2013-004806

EXTERNAL IDS

db:NVDid:CVE-2013-6015

Trust: 2.8

db:JUNIPERid:JSA10596

Trust: 2.0

db:SECUNIAid:55218

Trust: 1.7

db:SECTRACKid:1029177

Trust: 1.1

db:OSVDBid:98368

Trust: 1.1

db:BIDid:62963

Trust: 1.0

db:JVNDBid:JVNDB-2013-004806

Trust: 0.8

db:CNNVDid:CNNVD-201310-258

Trust: 0.7

db:VULHUBid:VHN-66017

Trust: 0.1

sources: VULHUB: VHN-66017 // BID: 62963 // JVNDB: JVNDB-2013-004806 // CNNVD: CNNVD-201310-258 // NVD: CVE-2013-6015

REFERENCES

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10596

Trust: 1.9

url:http://secunia.com/advisories/55218

Trust: 1.7

url:http://osvdb.org/98368

Trust: 1.1

url:http://www.securitytracker.com/id/1029177

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6015

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6015

Trust: 0.8

url:http://www.securityfocus.com/bid/62963

Trust: 0.6

url:http://www.juniper.net/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10596

Trust: 0.1

sources: VULHUB: VHN-66017 // BID: 62963 // JVNDB: JVNDB-2013-004806 // CNNVD: CNNVD-201310-258 // NVD: CVE-2013-6015

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 62963

SOURCES

db:VULHUBid:VHN-66017
db:BIDid:62963
db:JVNDBid:JVNDB-2013-004806
db:CNNVDid:CNNVD-201310-258
db:NVDid:CVE-2013-6015

LAST UPDATE DATE

2024-11-23T22:08:29.149000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66017date:2016-10-07T00:00:00
db:BIDid:62963date:2013-10-09T00:00:00
db:JVNDBid:JVNDB-2013-004806date:2013-10-22T00:00:00
db:CNNVDid:CNNVD-201310-258date:2013-10-21T00:00:00
db:NVDid:CVE-2013-6015date:2024-11-21T01:58:37.577

SOURCES RELEASE DATE

db:VULHUBid:VHN-66017date:2013-10-17T00:00:00
db:BIDid:62963date:2013-10-09T00:00:00
db:JVNDBid:JVNDB-2013-004806date:2013-10-22T00:00:00
db:CNNVDid:CNNVD-201310-258date:2013-10-17T00:00:00
db:NVDid:CVE-2013-6015date:2013-10-17T23:55:04.673