Support Support Downloads Knowledge Base Juniper Support Portal Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

2012-07: Routing and Switching: Security Advisories Released



Article ID: JSA10526 SECURITY_ADVISORIES Last Updated: 30 Nov 2020Version: 2.0
Legacy Advisory Id:
Product Affected:

A new Routing and Switching product security advisory bundle has been released. This message contains the link(s) to the new PSN advisories that have been released.

In the interest of speeding the delivery process for SIRT Security Announcements, the Juniper SIRT has implemented a small process change. When the Juniper SIRT publishes Security Advisories and/or Security Notices, a single primary PSN (this PSN) will be pushed to subscribed customers which briefly lists the IDs, descriptions, and links for all of the individual Security Announcements being released together on that day.

Please see the following links for more information about the new security advisories:
  1. PSN-2012-07-643: Incorrect behavior of SYN Cookie protection
  2. PSN-2012-07-644: Kernel crash due to ICMPv6 packet with corrupted payload
  3. PSN-2012-07-645: Incorrect integer conversions in OpenSSL can result in memory corruption (CVE-2012-2110)
  4. PSN-2012-07-646: Loading factory-default from exclusive edit causes escalation of privileges
  5. PSN-2012-07-647: rpd crash when receiving malformed IS-IS hello packets
  6. PSN-2012-07-648: rpd process can hang following a specific PIM broadcast storm
  7. PSN-2012-07-649: J-Web vulnerable to Cross Site Scripting
  8. PSN-2012-07-650: J-Web vulnerable to hash table collision attacks (CVE-2011-3414)
  9. PSN-2012-07-651: When 'log' action is enabled, a firewall filter deployed on lo0 cannot filter high rate of packets sent to the RE
  10. PSN-2012-07-652: flowd core when processing non-first IP fragmented packets
  11. PSN-2012-07-653: Inbound SSH traffic is allowed even though 'host-inbound-traffic' is not configured to allow it
Modification History:
2012-11-07: Initial publication
2020-11-20: Updated terminology

CVSS Score:
Severity Level:
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search