Published: 2007-12-14,
Last Updated: 2007-12-15 00:14:07 UTC
by William Stearns (Version: 5)
Juniper Networks has put out an important advisory related to their routers. It appears that malformed BGP packets may induce BGP session flapping.
JUNOS releases from 7.3 to 8.4 are vulnerable to crafted IPV6 messages that may crash the kernel. Versions 8.5R1 and above have this memory issue fixed.
If you're a registered user, please see this link for the BGP issue.
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2007-12-008&viewMode=view
And this one for the IPv6 issue
www2.juniper.net/alerts/viewalert.jsp
There's a discussion about the problems at:
https://puck.nether.net/pipermail/juniper-nsp/2007-December/009296.html
Because this crash can be remotely triggered, this issue should be addressed as soon as is practical.
資料來源 http://isc.sans.org/diary.html?storyid=3748&rss
Last Updated: 2007-12-15 00:14:07 UTC
by William Stearns (Version: 5)
Juniper Networks has put out an important advisory related to their routers. It appears that malformed BGP packets may induce BGP session flapping.
JUNOS releases from 7.3 to 8.4 are vulnerable to crafted IPV6 messages that may crash the kernel. Versions 8.5R1 and above have this memory issue fixed.
If you're a registered user, please see this link for the BGP issue.
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2007-12-008&viewMode=view
And this one for the IPv6 issue
www2.juniper.net/alerts/viewalert.jsp
There's a discussion about the problems at:
https://puck.nether.net/pipermail/juniper-nsp/2007-December/009296.html
Because this crash can be remotely triggered, this issue should be addressed as soon as is practical.
資料來源 http://isc.sans.org/diary.html?storyid=3748&rss
全站熱搜
留言列表