CVE-2014-6382
Summary
| CVE | CVE-2014-6382 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-01-16 16:59:00 UTC |
| Updated | 2015-02-04 05:03:00 UTC |
| Description | The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos | 13.3 | r3 | All | All |
| Operating System | Juniper | Junos | 13.3 | r4 | All | All |
| Operating System | Juniper | Junos | 13.3 | r5 | All | All |
| Operating System | Juniper | Junos | 14.1 | All | All | All |
| Operating System | Juniper | Junos | 14.1 | r1 | All | All |
| Operating System | Juniper | Junos | 14.1 | r2 | All | All |
| Operating System | Juniper | Junos | 14.1 | r3 | All | All |
| Operating System | Juniper | Junos | 14.2 | All | All | All |
| Operating System | Juniper | Junos | 14.2 | r1 | All | All |
| Operating System | Juniper | Junos | 13.3 | r3 | All | All |
| Operating System | Juniper | Junos | 13.3 | r4 | All | All |
| Operating System | Juniper | Junos | 13.3 | r5 | All | All |
| Operating System | Juniper | Junos | 14.1 | All | All | All |
| Operating System | Juniper | Junos | 14.1 | r1 | All | All |
| Operating System | Juniper | Junos | 14.1 | r2 | All | All |
| Operating System | Juniper | Junos | 14.1 | r3 | All | All |
| Operating System | Juniper | Junos | 14.2 | All | All | All |
| Operating System | Juniper | Junos | 14.2 | r1 | All | All |
| Hardware | Juniper | Mx10 | All | All | All | All |
| Hardware | Juniper | Mx10 | All | All | All | All |
| Hardware | Juniper | Mx104 | All | All | All | All |
| Hardware | Juniper | Mx104 | All | All | All | All |
| Hardware | Juniper | Mx2010 | All | All | All | All |
| Hardware | Juniper | Mx2010 | All | All | All | All |
| Hardware | Juniper | Mx2020 | All | All | All | All |
| Hardware | Juniper | Mx2020 | All | All | All | All |
| Hardware | Juniper | Mx240 | All | All | All | All |
| Hardware | Juniper | Mx240 | All | All | All | All |
| Hardware | Juniper | Mx40 | All | All | All | All |
| Hardware | Juniper | Mx40 | All | All | All | All |
| Hardware | Juniper | Mx480 | All | All | All | All |
| Hardware | Juniper | Mx480 | All | All | All | All |
| Hardware | Juniper | Mx80 | All | All | All | All |
| Hardware | Juniper | Mx80 | All | All | All | All |
| Hardware | Juniper | Mx960 | All | All | All | All |
| Hardware | Juniper | Mx960 | All | All | All | All |
| Operating System | Juniper | Vmx | All | All | All | All |
| Operating System | Juniper | Vmx | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 2015-01 Security Bulletin: Junos: jpppd core when MX Series router receives crafted PAP Authenticate-Request (CVE-2014-6382) - Juniper Networks | CONFIRM | kb.juniper.net | Vendor Advisory |
| Juniper Junos JPPP Daemon CVE-2014-6382 Remote Denial of Service Vulnerability | BID | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.