Vulnerabilities > CVE-2016-1260 - Resource Management Errors vulnerability in Juniper Junos 13.2X51/14.1X53/15.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
LOW Summary
Juniper Junos OS before 13.2X51-D36, 14.1X53 before 14.1X53-D25, and 15.2 before 15.2R1 on EX4300 series switches allow remote attackers to cause a denial of service (network loop and bandwidth consumption) via unspecified vectors related to Spanning Tree Protocol (STP) traffic.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 13 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Junos Local Security Checks |
NASL id | JUNIPER_JSA10719.NASL |
description | According to its self-reported version number, the remote Juniper Junos device is affected by a denial of service vulnerability due to a flaw in the Spanning Tree Protocol implementation. An unauthenticated, remote attacker can exploit this, via specially crafted packets that create an artificial loop in the network topology, to cause excessive bandwidth usage. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 88094 |
published | 2016-01-22 |
reporter | This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/88094 |
title | Juniper Junos Network Topology Loop DoS (JSA10719) |
code |
|