Vulnerability Description
The kernel in Juniper Junos 10.4 before 10.4R14, 11.4 before 11.4R8, 11.4X27 before 11.4X27.43, 12.1 before 12.1R6, 12.1X44 before 12.1X44-D20, 12.2 before 12.2R4, and 12.3 before 12.3R2, in certain VLAN configurations with unrestricted arp-resp and proxy-arp settings, allows remote attackers to cause a denial of service (device crash) via a crafted ARP request, aka PR 842091.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 10.4 |
References
- http://kb.juniper.net/JSA10576Vendor Advisory
- http://secunia.com/advisories/54119
- http://www.securityfocus.com/bid/61126
- http://kb.juniper.net/JSA10576Vendor Advisory
- http://secunia.com/advisories/54119
- http://www.securityfocus.com/bid/61126
FAQ
What is CVE-2013-4686?
CVE-2013-4686 is a vulnerability with a CVSS score of 7.1 (HIGH). The kernel in Juniper Junos 10.4 before 10.4R14, 11.4 before 11.4R8, 11.4X27 before 11.4X27.43, 12.1 before 12.1R6, 12.1X44 before 12.1X44-D20, 12.2 before 12.2R4, and 12.3 before 12.3R2, in certain V...
How severe is CVE-2013-4686?
CVE-2013-4686 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4686?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.