CVE-2006-3529
Published Jul 12, 2006
Last updated 7 years ago
Overview
- Description
- Memory leak in Juniper JUNOS 6.4 through 8.0, built before May 10, 2006, allows remote attackers to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:junos:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8089D28-839F-45CF-9247-969A9739E685" }, { "criteria": "cpe:2.3:o:juniper:junos:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8664DCE8-CDED-4F79-AB0C-39EBAC70CB80" }, { "criteria": "cpe:2.3:o:juniper:junos:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "534326C1-089F-4F5D-8C16-F9612DA81CB8" }, { "criteria": "cpe:2.3:o:juniper:junos:6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "975AF42B-DC98-40FA-8320-E836B14363E7" }, { "criteria": "cpe:2.3:o:juniper:junos:6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E05A9228-0C1F-4545-A1D9-3F1B3D350C56" }, { "criteria": "cpe:2.3:o:juniper:junos:6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0ABDDB7-20CB-4F56-8F12-7A584814E7ED" }, { "criteria": "cpe:2.3:o:juniper:junos:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3195C856-8C0F-44DA-8DBB-ADD1854F0D66" }, { "criteria": "cpe:2.3:o:juniper:junos:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15480017-59ED-446C-9E9C-13D710ABC9E5" }, { "criteria": "cpe:2.3:o:juniper:junos:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF1C2CC2-9EA4-4017-BFF7-399FEBA0DE9E" }, { "criteria": "cpe:2.3:o:juniper:junos:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F443DB8-1E98-4D66-A75D-DCC4716218E8" }, { "criteria": "cpe:2.3:o:juniper:junos:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E51EBFBB-9236-436F-AC05-C7AFD9452A73" }, { "criteria": "cpe:2.3:o:juniper:junos:7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "851DD20A-9796-4B06-A9FF-C16D74310156" }, { "criteria": "cpe:2.3:o:juniper:junos:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38C56079-E4AC-4CE2-805D-AB893F82070C" }, { "criteria": "cpe:2.3:o:juniper:junos:7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "913BE97D-81FB-44A6-B699-C0DBED49E130" }, { "criteria": "cpe:2.3:o:juniper:junos:7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "690C6E3A-BD5E-4F68-BC65-866A7962731E" }, { "criteria": "cpe:2.3:o:juniper:junos:7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E36DE975-8D35-4789-8A5F-F120F6B47174" }, { "criteria": "cpe:2.3:o:juniper:junos:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0EE5FF2-A12F-41EF-9A3D-66B471288BF8" } ], "operator": "OR" } ] } ]