CVE-2013-7313

Severity

54%

Complexity

55%

Confidentiality

106%

Per: http://cwe.mitre.org/data/definitions/694.html "CWE-694: Use of Multiple Resources with Duplicate Identifier"

The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.

Per: http://cwe.mitre.org/data/definitions/694.html "CWE-694: Use of Multiple Resources with Duplicate Identifier"

CVSS 2.0 Base Score 5.4. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: medium. CVSS Vector: (AV:A/AC:M/Au:N/C:P/I:P/A:P).

Overview

Type

Juniper

First reported 11 years ago

2014-01-23 17:55:00

Last updated 11 years ago

2014-01-23 20:26:00

Affected Software

Juniper JUNOS 4.0

4.0

Juniper JUNOS 4.1

4.1

Juniper JUNOS 4.2

4.2

Juniper JUNOS 4.3

4.3

Juniper JUNOS 4.4

4.4

Juniper JUNOS 5.0

5.0

Juniper Juniper Router M10 5.0 r3

5.0r3

Juniper Juniper Router M10 5.0 r4

5.0r4

Juniper JUNOS 5.1

5.1

Juniper JUNOS 5.2

5.2

Juniper JUNOS 5.3

5.3

Juniper JUNOS 5.4

5.4

Juniper JUNOS 5.5

5.5

Juniper JUNOS 5.6

5.6

Juniper JUNOS 5.7

5.7

Juniper JUNOS 6.0

6.0

Juniper JUNOS 6.1

6.1

Juniper JUNOS 6.2

6.2

Juniper JUNOS 6.3

6.3

Juniper JUNOS 6.4

6.4

Juniper JUNOS 7.0

7.0

Juniper JUNOS 7.1

7.1

Juniper JUNOS 7.2

7.2

Juniper JUNOS 7.3

7.3

Juniper JUNOS 7.4

7.4

Juniper JUNOS 7.5

7.5

Juniper JUNOS 7.6

7.6

Juniper JUNOS 8.0

8.0

Juniper JUNOS 8.1

8.1

Juniper JUNOS 8.2

8.2

Juniper JUNOS 8.3

8.3

Juniper JUNOS 8.4

8.4

Juniper JUNOS 9.0

9.0

Juniper JUNOS 9.1

9.1

Juniper JUNOS 9.2

9.2

Juniper JUNOS 9.4

9.4

Juniper JUNOS 9.5

9.5

Juniper JUNOS 9.6

9.6

Juniper JUNOS 10.0

10.0

Juniper JUNOS 10.1

10.1

Juniper JUNOS 10.2

10.2

Juniper JUNOS 10.3

10.3

Juniper JUNOS 10.4

10.4

Juniper JUNOS 10.4R

10.4r

Juniper JUNOS 10.4S

10.4s

Juniper JUNOS 11.0

11.0

Juniper JUNOS 11.1

11.1

Juniper JUNOS 11.2

11.2

Juniper JUNOS 11.3

11.3

Juniper JUNOS 11.4

11.4

Juniper JUNOS 11.4X27

11.4x27

Juniper JUNOS 12.1

12.1

Juniper JUNOS 12.1R

12.1r

Juniper JUNOS 12.1X44

12.1x44

Juniper JUNOS 12.1X45

12.1x45

Juniper JUNOS 12.1X46

12.1x46

Juniper JUNOS 12.2

12.2

Juniper JUNOS 12.3

12.3

Juniper JUNOS 13.1

13.1

Juniper JUNOS 13.2

13.2

Juniper JUNOS 13.3

13.3

Juniper JUNOSe

Juniper Networks ScreenOS 5.4.0

5.4.0

Juniper Networks ScreenOS 6.0.0

6.0.0

Juniper Networks ScreenOS 6.1.0

6.1.0

Juniper Networks ScreenOS 6.2.0

6.2.0

Juniper Networks ScreenOS

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.