Vulnerability Name:

CVE-2013-4688 (CCN-85591)

Assigned:2013-07-11
Published:2013-07-11
Updated:2013-08-22
Summary:flowd in Juniper Junos 10.4 before 10.4R11 on SRX devices, when the MSRPC Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted MSRPC requests, aka PR 772834.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2013-4688

Source: CCN
Type: JSA10578
Junos: SRX flowd core while processing MSRPC messages (CVE-2013-4688)

Source: CONFIRM
Type: Vendor Advisory
http://kb.juniper.net/JSA10578

Source: CCN
Type: SA54160
Juniper Junos MSRPC Message Handling Denial of Service Vulnerability

Source: BID
Type: UNKNOWN
61124

Source: CCN
Type: BID-61124
Juniper Networks Junos CVE-2013-4688 Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
junos-cve20134688-dos(85591)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:10.4:*:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:srx100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx110:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx1400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx210:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx220:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx240:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5800:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx650:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:10.4:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:11.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:12.1:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 10.4
    juniper srx100 -
    juniper srx110 -
    juniper srx1400 -
    juniper srx210 -
    juniper srx220 -
    juniper srx240 -
    juniper srx3400 -
    juniper srx3600 -
    juniper srx550 -
    juniper srx5600 -
    juniper srx5800 -
    juniper srx650 -
    juniper junos 10.4
    juniper junos 11.4 -
    juniper junos 12.1 -