MEDIUM · 4.3

CVE-2013-6015

Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is c...

Vulnerability Description

Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
JuniperJunos<= 10.4
JuniperSrx100-
JuniperSrx110-
JuniperSrx1400-
JuniperSrx210-
JuniperSrx220-
JuniperSrx240-
JuniperSrx3400-
JuniperSrx3600-
JuniperSrx550-
JuniperSrx5600-
JuniperSrx5800-
JuniperSrx650-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6015?

CVE-2013-6015 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is c...

How severe is CVE-2013-6015?

CVE-2013-6015 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6015?

Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx100, Juniper Srx110, Juniper Srx1400, Juniper Srx210.