Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-5358 | First vendor Publication | 2015-07-14 |
Vendor | Cve | Last vendor Modification | 2017-09-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5358 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0148 - Multiple Vulnerabilities in Juniper JUNOS OS Severity : Category I - VMSKEY : V0061071 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-08-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_0c064c43600a11e6a6c314dae9d210b8.nasl - Type : ACT_GATHER_INFO |
2015-08-04 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10686.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-02-02 01:33:07 |
|
2024-02-01 12:09:37 |
|
2023-09-05 12:31:29 |
|
2023-09-05 01:09:27 |
|
2023-09-02 12:31:26 |
|
2023-09-02 01:09:38 |
|
2023-08-12 12:34:13 |
|
2023-08-12 01:09:06 |
|
2023-08-11 12:29:28 |
|
2023-08-11 01:09:21 |
|
2023-08-06 12:28:38 |
|
2023-08-06 01:09:05 |
|
2023-08-04 12:28:44 |
|
2023-08-04 01:09:09 |
|
2023-07-14 12:28:44 |
|
2023-07-14 01:09:07 |
|
2023-03-29 01:30:28 |
|
2023-03-28 12:09:27 |
|
2022-10-11 12:25:52 |
|
2022-10-11 01:09:15 |
|
2021-05-04 12:40:48 |
|
2021-04-22 01:49:46 |
|
2020-05-23 00:45:59 |
|
2019-04-16 12:06:36 |
|
2017-09-21 09:25:21 |
|
2016-12-22 09:24:01 |
|
2016-12-07 21:24:42 |
|
2016-08-13 13:26:56 |
|
2016-04-27 02:36:17 |
|
2015-10-18 17:25:34 |
|
2015-08-12 13:33:30 |
|
2015-07-22 05:32:13 |
|
2015-07-17 17:27:16 |
|
2015-07-14 21:27:17 |
|