{"vuid":"VU#294036","idnumber":"294036","name":"Juniper JUNOS IPv6 denial-of-service vulnerability","keywords":["Juniper","routers","DoS","denial of service","IPv6 extensions","PR/67593"],"overview":"Juniper JUNOS Internet Software contains a vulnerability in IPv6 handling that could allow a remote attacker to cause a denial of service.","clean_desc":"Juniper router operating system software (JUNOS) does not properly free memory allocated for certain IPv6 packets. If a fixed amount of memory is exhausted, the system will crash. An attacker could exploit this vulnerability using specially crafted IPv6 packets. Juniper T, M, and J-series routers running versions of JUNOS 6.4 - 8.0 built prior to May 10, 2006 are affected. Juniper's bug ID for this vulnerability is  PR/67593.","impact":"A remote attacker could cause a denial of service on an affected device. Systems or networks that rely on a vulnerable router for connectivity would also be affected as a result.","resolution":"Upgrade\nJuniper has released updated versions of JUNOS. Please visit the Juniper support site (JTAC Security Bulletin PSN-2006-06-017, login required) for more information. There is also a public version of JTAC Security Bulletin PSN-2006-06-017.","workarounds":"Workarounds Disable IPv6 Sites that are unable to update or do not require IPv6 should consider removing all IPv6 configuration parameters from the router.","sysaffected":"","thanks":"Thanks to Juniper for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://www.juniper.net/support/security/alerts/EXT-PSN-2006-06-017.txt","https://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2006-06-017","http://www.juniper.net/support/security/alerts/IPv6_bug.txt"],"cveids":["CVE-2006-3529"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-09T18:46:38Z","publicdate":"2006-07-10T00:00:00Z","datefirstpublished":"2006-07-11T14:34:05Z","dateupdated":"2006-07-17T13:48:02Z","revision":30,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"5","cam_exploitation":"1","cam_internetinfrastructure":"20","cam_population":"18","cam_impact":"8","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.232","cam_scorecurrentwidelyknown":"17.712","cam_scorecurrentwidelyknownexploited":"25.92","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.232,"vulnote":null}