code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(124236);
script_version("1.2");
script_cvs_date("Date: 2020/01/17");
script_cve_id("CVE-2019-0031");
script_bugtraq_id(107874);
script_name(english:"Juniper Junos memory consumption denial of service (JSA10920)");
script_summary(english:"Checks the Junos version and build date.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the remote Juniper Junos device is affected by a denial of service
vulnerability in the jdhcpd daemon due to failure to handle exceptional conditions. An unauthenticated, remote attacker
can exploit this, via sending specific IPv6 DHCP packets to the jdhcpd daemon to cause a denial of service condition to
clients requesting and not receiving IP addresses.");
# https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10920&cat=SIRT_1&actp=LIST
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d08cf5af");
script_set_attribute(attribute:"solution", value:
"Apply the relevant Junos software release referenced in Juniper advisory JSA10920");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0031");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/10");
script_set_attribute(attribute:"patch_publication_date", value:"2019/04/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/23");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Junos Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("junos_version.nasl");
script_require_keys("Host/Juniper/JUNOS/Version");
exit(0);
}
include("audit.inc");
include("junos.inc");
include("misc_func.inc");
ver = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');
fixes = make_array();
fixes["17.4"] = "17.4R2";
fixes["18.1"] = "18.1R2";
fix = check_junos(ver:ver, fixes:fixes, exit_on_fail:TRUE);
report = get_report(ver:ver, fix:fix);
security_report_v4(severity:SECURITY_WARNING, port:0, extra:report);
|