Vulnerability Description
Juniper Junos OS before 12.1X46-D50, 12.1X47 before 12.1X47-D23, 12.3X48 before 12.3X48-D25, and 15.1X49 before 15.1X49-D40 on a High-End SRX-Series chassis system with one or more Application Layer Gateways (ALGs) enabled allow remote attackers to cause a denial of service (CPU consumption, fab link failure, or flip-flop failovers) via vectors related to in-transit traffic matching ALG rules.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 12.1x46 |
Related Weaknesses (CWE)
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10751MitigationVendor Advisory
- http://www.securityfocus.com/bid/91764Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036305Third Party AdvisoryVDB Entry
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10751MitigationVendor Advisory
- http://www.securityfocus.com/bid/91764Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036305Third Party AdvisoryVDB Entry
FAQ
What is CVE-2016-1276?
CVE-2016-1276 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Juniper Junos OS before 12.1X46-D50, 12.1X47 before 12.1X47-D23, 12.3X48 before 12.3X48-D25, and 15.1X49 before 15.1X49-D40 on a High-End SRX-Series chassis system with one or more Application Layer G...
How severe is CVE-2016-1276?
CVE-2016-1276 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1276?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.