A vulnerability in the OSPF protocol allows a remote attacker to insert, update or delete routes in the OSPF database.
A remote attacker might re-route traffic, compromise the confidentially of data or cunduct a DoS attack by dropping all traffic.
New builds of Junos OS software are available from Juniper. Use MD5 authentication when configuring OSPF. MD5 authentication completely mitigates this issue.
A vulnerability has been discovered in the OSPF (Open Shortest Path First) protocol that allows a remote attacker to insert, update or delete routes in the OSPF database.
Plattforms running Junos OS before versions 13.1R3, 13.2X50-D10, 12.3R3, 12.2R5, 12.1R7, 12.1X45-D10, 12.1X44-D15, 11.4R8 and 10.4R15
Check the OS build.