CVE-2013-6170Improper Input Validation in Juniper Junos

Severity
4.3MEDIUMNVD
EPSS
0.7%
top 28.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 17
Latest updateMay 17

Description

Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote attackers to cause a denial of service (RPD routing daemon crash) via a large number of crafted PIM (S,G) join requests.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

NVDjuniper/junos5 versions+4

🔴Vulnerability Details

1
GHSA
GHSA-mw96-jjjg-69gg: Juniper Junos 102022-05-17

📋Vendor Advisories

1
Juniper
CVE-2013-6170: Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multi2013-10-17