Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets.
References
Link | Resource |
---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10596 | Vendor Advisory |
http://osvdb.org/98368 | |
http://secunia.com/advisories/55218 | Vendor Advisory |
http://www.securitytracker.com/id/1029177 |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2013-10-17 23:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-6015
Mitre link : CVE-2013-6015
CVE.ORG link : CVE-2013-6015
JSON object : View
Products Affected
juniper
- srx650
- srx220
- srx110
- srx100
- srx5600
- srx1400
- srx210
- junos
- srx550
- srx3400
- srx3600
- srx5800
- srx240
CWE
CWE-20
Improper Input Validation