Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/101864 - | |
References | () http://www.securityfocus.com/bid/64769 - | |
References | () http://www.securitytracker.com/id/1029584 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90238 - | |
References | () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611 - Vendor Advisory |
Information
Published : 2014-01-11 04:44
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0618
Mitre link : CVE-2014-0618
CVE.ORG link : CVE-2014-0618
JSON object : View
Products Affected
juniper
- srx3600
- srx1400
- srx210
- srx240
- srx3400
- srx650
- srx110
- srx550
- srx100
- srx5600
- srx5800
- junos
- srx220
CWE