Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-4684


flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R8, 12.1 before 12.1R7, and 12.1X44 before 12.1X44-D15 on SRX devices, when PIM and NAT are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted PIM packets, aka PR 842253.


Published

2013-07-11T14:55:01.310

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System juniper junos 10.4 Yes
Operating System juniper junos 11.4 Yes
Operating System juniper junos 12.1 Yes
Operating System juniper junos 12.1x44 Yes
Hardware juniper srx100 - Yes
Hardware juniper srx110 - Yes
Hardware juniper srx1400 - Yes
Hardware juniper srx210 - Yes
Hardware juniper srx220 - Yes
Hardware juniper srx240 - Yes
Hardware juniper srx3400 - Yes
Hardware juniper srx3600 - Yes
Hardware juniper srx550 - Yes
Hardware juniper srx5600 - Yes
Hardware juniper srx5800 - Yes
Hardware juniper srx650 - Yes

References