The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/72070 - | |
References | () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665 - Vendor Advisory |
Information
Published : 2015-01-16 16:59
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6382
Mitre link : CVE-2014-6382
CVE.ORG link : CVE-2014-6382
JSON object : View
Products Affected
juniper
- mx40
- mx960
- mx80
- mx2020
- mx10
- junos
- mx104
- vmx
- mx2010
- mx240
- mx480
CWE
CWE-20
Improper Input Validation