Vulnerability Description
Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote attackers to cause a denial of service (RPD routing daemon crash) via a large number of crafted PIM (S,G) join requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 10.0 |
Related Weaknesses (CWE)
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10548Vendor Advisory
- http://secunia.com/advisories/55216Vendor Advisory
- http://www.securityfocus.com/bid/62973
- http://www.securitytracker.com/id/1029176
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10548Vendor Advisory
- http://secunia.com/advisories/55216Vendor Advisory
- http://www.securityfocus.com/bid/62973
- http://www.securitytracker.com/id/1029176
FAQ
What is CVE-2013-6170?
CVE-2013-6170 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote at...
How severe is CVE-2013-6170?
CVE-2013-6170 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6170?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.