Vulnerability Description
flowd in Juniper Junos 10.4 before 10.4R11 on SRX devices, when the MSRPC Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted MSRPC requests, aka PR 772834.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 10.4 |
| Juniper | Srx100 | - |
| Juniper | Srx110 | - |
| Juniper | Srx1400 | - |
| Juniper | Srx210 | - |
| Juniper | Srx220 | - |
| Juniper | Srx240 | - |
| Juniper | Srx3400 | - |
| Juniper | Srx3600 | - |
| Juniper | Srx550 | - |
| Juniper | Srx5600 | - |
| Juniper | Srx5800 | - |
| Juniper | Srx650 | - |
References
- http://kb.juniper.net/JSA10578Vendor Advisory
- http://www.securityfocus.com/bid/61124
- http://kb.juniper.net/JSA10578Vendor Advisory
- http://www.securityfocus.com/bid/61124
FAQ
What is CVE-2013-4688?
CVE-2013-4688 is a vulnerability with a CVSS score of 7.8 (HIGH). flowd in Juniper Junos 10.4 before 10.4R11 on SRX devices, when the MSRPC Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted MS...
How severe is CVE-2013-4688?
CVE-2013-4688 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4688?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx100, Juniper Srx110, Juniper Srx1400, Juniper Srx210.