CVE-2014-6382

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*
OR cpe:2.3:h:juniper:mx10:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx104:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2010:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2020:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx240:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx40:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx480:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx80:*:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx960:*:*:*:*:*:*:*:*
cpe:2.3:o:juniper:vmx:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/72070 - () http://www.securityfocus.com/bid/72070 -
References () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665 - Vendor Advisory () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665 - Vendor Advisory

Information

Published : 2015-01-16 16:59

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6382

Mitre link : CVE-2014-6382

CVE.ORG link : CVE-2014-6382


JSON object : View

Products Affected

juniper

  • mx40
  • mx960
  • mx80
  • mx2020
  • mx10
  • junos
  • mx104
  • vmx
  • mx2010
  • mx240
  • mx480
CWE
CWE-20

Improper Input Validation