CVE-2014-0613

Severity

71%

Complexity

86%

Confidentiality

115%

The XNM command processor in Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R5, 13.1 before 13.1R3-S1, 13.2 before 13.2R2-S2, and 13.3 before 13.3R1, when xnm-ssl or xnm-clear-text is enabled, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.

The XNM command processor in Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R5, 13.1 before 13.1R3-S1, 13.2 before 13.2R2-S2, and 13.3 before 13.3R1, when xnm-ssl or xnm-clear-text is enabled, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.

CVSS 2.0 Base Score 7.1. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C).

Overview

Type

Juniper JUNOS

First reported 11 years ago

2014-01-15 16:08:00

Last updated 11 years ago

2014-01-15 18:11:00

Affected Software

Juniper JUNOS 10.4

10.4

Juniper JUNOS 11.4

11.4

Juniper JUNOS 12.1R

12.1r

Juniper JUNOS 12.1X44

12.1x44

Juniper JUNOS 12.1X45

12.1x45

Juniper JUNOS 12.1X46

12.1x46

Juniper JUNOS 12.2

12.2

Juniper JUNOS 12.3

12.3

Juniper JUNOS 13.1

13.1

Juniper JUNOS 13.2

13.2

Juniper JUNOS 13.3

13.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.