Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594 - Vendor Advisory | |
References | () http://osvdb.org/98369 - | |
References | () http://secunia.com/advisories/55109 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/62962 - | |
References | () http://www.securitytracker.com/id/1029175 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/87847 - |
Information
Published : 2013-10-17 23:55
Updated : 2024-11-21 01:58
NVD link : CVE-2013-6013
Mitre link : CVE-2013-6013
CVE.ORG link : CVE-2013-6013
JSON object : View
Products Affected
juniper
- srx100
- srx1400
- srx220
- srx3400
- srx110
- srx3600
- srx240
- srx650
- srx210
- junos
- srx5600
- srx5800
- srx550
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer