Vulnerability Description
Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | <= 10.4 |
| Juniper | Srx100 | - |
| Juniper | Srx110 | - |
| Juniper | Srx1400 | - |
| Juniper | Srx210 | - |
| Juniper | Srx220 | - |
| Juniper | Srx240 | - |
| Juniper | Srx3400 | - |
| Juniper | Srx3600 | - |
| Juniper | Srx550 | - |
| Juniper | Srx5600 | - |
| Juniper | Srx5800 | - |
| Juniper | Srx650 | - |
Related Weaknesses (CWE)
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10596Vendor Advisory
- http://osvdb.org/98368
- http://secunia.com/advisories/55218Vendor Advisory
- http://www.securitytracker.com/id/1029177
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10596Vendor Advisory
- http://osvdb.org/98368
- http://secunia.com/advisories/55218Vendor Advisory
- http://www.securitytracker.com/id/1029177
FAQ
What is CVE-2013-6015?
CVE-2013-6015 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is c...
How severe is CVE-2013-6015?
CVE-2013-6015 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6015?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx100, Juniper Srx110, Juniper Srx1400, Juniper Srx210.