MEDIUM · 6.8

CVE-2013-6013

Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-t...

Vulnerability Description

Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
JuniperJunos<= 10.4
JuniperSrx100-
JuniperSrx110-
JuniperSrx1400-
JuniperSrx210-
JuniperSrx220-
JuniperSrx240-
JuniperSrx3400-
JuniperSrx3600-
JuniperSrx550-
JuniperSrx5600-
JuniperSrx5800-
JuniperSrx650-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6013?

CVE-2013-6013 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-t...

How severe is CVE-2013-6013?

CVE-2013-6013 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6013?

Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx100, Juniper Srx110, Juniper Srx1400, Juniper Srx210.