Vulnerabilities > CVE-2014-3813 - Denial of Service vulnerability in Juniper Netscreen-5200, Netscreen-5400 and Screenos

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
juniper
nessus

Summary

Unspecified vulnerability in the Juniper Networks NetScreen Firewall products with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via vectors related to a DNS lookup.

Nessus

NASL familyFirewalls
NASL idSCREENOS_JSA10631.NASL
descriptionThe remote host is running a version of Juniper ScreenOS 6.3 prior to 6.3.0r17. It is, therefore, affected by a denial of service vulnerability. A denial of service flaw exists in the built-in DNS lookup client. The flaw could allow a remote attacker to cause the device to crash or reboot, and repeated exploitation can result in an extended denial of service condition.
last seen2020-06-01
modified2020-06-02
plugin id76279
published2014-06-27
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/76279
titleJuniper ScreenOS 6.3 < 6.3.0r17 DNS Lookup DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(76279);
  script_version("1.3");
  script_cvs_date("Date: 2018/07/27 18:38:14");

  script_cve_id("CVE-2014-3813");
  script_bugtraq_id(68189);
  script_xref(name:"IAVB", value:"2014-B-0082");

  script_name(english:"Juniper ScreenOS 6.3 < 6.3.0r17 DNS Lookup DoS");
  script_summary(english:"Checks version of ScreenOS.");

  script_set_attribute(attribute:"synopsis", value:"The remote host is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of Juniper ScreenOS 6.3 prior to
6.3.0r17. It is, therefore, affected by a denial of service
vulnerability.

A denial of service flaw exists in the built-in DNS lookup client. The
flaw could allow a remote attacker to cause the device to crash or
reboot, and repeated exploitation can result in an extended denial of
service condition.");
  script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10631");
  script_set_attribute(attribute:"solution", value:"Upgrade to 6.3.0r17 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/06/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/06/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/27");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:screenos");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Firewalls");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("screenos_version.nbin");
  script_require_keys("Host/Juniper/ScreenOS/display_version", "Host/Juniper/ScreenOS/version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

app_name = "Juniper ScreenOS";
display_version = get_kb_item_or_exit("Host/Juniper/ScreenOS/display_version");
version = get_kb_item_or_exit("Host/Juniper/ScreenOS/version");

display_fix = "6.3.0r17";
fix = str_replace(string:display_fix, find:'r', replace:'.');

# Only treat 6.3 as affected.
if (version =~ "^6\.3\." && ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
  port = 0;
  if (report_verbosity > 0)
  {
    report =
      '\n  Installed version : ' + display_version +
      '\n  Fixed version     : ' + display_fix +
      '\n';

    security_hole(extra:report, port:port);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_INST_VER_NOT_VULN, app_name, display_version);