Juniper routers vulnerable to attacks
By sending a custom-built transmission control protocol (TCP) packet to a listening port on a Juniper Routing Engine, an attacker can make the kernel of Junos crash and case routers to switch over or reboot, according to technicians at Juniper Networks.

The flaw in Juniper’s router operating system, which affects older versions of the Juno software released before January 17, was uncovered during an internal routing product testing.

In a statement today, Juniper said it has not heard that the vulnerability is being exploited and that fixes to the flaw for affected platforms are available.

The company also advised administrators to implement source address anti-spoofing to prevent transmissions from bogus from reaching devices.

RELATED CONTENT

6 nasty Internet routing attacks
Application-targeted DDoS attacks increasing

Unicast reverse path forwarding can be done to reduce the risks of attacks. This method involves checking if the IP address in a packet is reachable. If the address could not be reached, the packet is dropped.

Other security measures include using RFC 3682 time-to-live security as well as implementing access lists or firewall filters for routers.

Read the whole story here

 



Related Download
Real-time visibility Sponsor: Interactive Intelligence
Real-time visibility
Get real-time visibility in the contact centre. See immediate benefits. Real-time visibility in the contact centre is crucial. When you do not have the info you need to make decisions, you lose out on the single best way to create a competitive advantage. Solving this issue is simple, though.
Register Now