NetScreen-25 remote SSH request denial of service

netscreen-ssh-dos (10528) The risk level is classified as MediumMedium Risk

Description:

NetScreen-25 and possibly other NetScreen security devices with the SSH (Secure Shell) management port enabled, are vulnerable to a denial of service attack. A remote attacker could send a malformed request to the SSH management port on the NetScreen device to cause the device to crash. This vulnerability could also be triggered using the "SSH CRC32" remote exploit.

For more information on the "SSH CRC32" vulnerability, refer to Internet Security Systems Security Alert, October 30, 2001. See References.


Consequences:

Denial of Service

Remedy:

Upgrade to the latest version of ScreenOS (4.0.0r6 or later), available from the NetScreen Web site. See References.

As a workaround, disable the SSH remote management port.

References:

Platforms Affected:

  • Juniper NetScreen ScreenOS 4.0.0
  • Juniper NetScreen ScreenOS 4.0.0r1
  • Juniper NetScreen ScreenOS 4.0.0r2
  • Juniper NetScreen ScreenOS 4.0.0r3
  • Juniper NetScreen ScreenOS 4.0.0r4
  • Juniper NetScreen ScreenOS 4.0.0r5
  • Juniper NetScreen ScreenOS 4.0.0r6

Reported:

Nov 01, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page