Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

IPSec Replay vulnerability (FreeBSD Security Advisory FreeBSD-SA-06:11.ipsec)

0

0

Article ID: JSA10359 SECURITY_ADVISORIES Last Updated: 09 May 2013Version: 2.0
Legacy Advisory Id:
PSN-2006-03-014
Product Affected:
All Juniper networks products
Problem:
The IPSec implementation used in FreeBSD fails to update the replay sequence number. As a result, there is no protection against replay attacks.
Solution:
Code inspection has determined that the affected portion of the FreeBSD IPSec implementation is not used in the JUNOS operating system. Therefore, all versions of JUNOS are NOT SUSCEPTIBLE to this vulnerability.

The IPSec implementations used in ScreenOS and JUNOSe are not derived from the FreeBSD implementation. Code inspection has determined that ScreenOS and JUNOSe are also NOT SUSCEPTIBLE to this vulnerability.
Implementation:
No customer action is required. Juniper Networks products are NOT SUSCEPTIBLE to this vulnerability.
Severity Level:
None
Severity Assessment:
Juniper Networks products are NOT SUSCEPTIBLE to this vulnerability.
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search