NetScreen ScreenOS port scan denial of service

netscreen-screenos-scan-dos (8057) The risk level is classified as MediumMedium Risk

Description:

NetScreen is vulnerable to a denial of service attack. If a local attacker from within the trusted network performs a port scan on an external system, the attacker could cause the ScreenOS to fail, if a port scanner that fails to release sessions is being used.


Consequences:

Denial of Service

Remedy:

For NetScreen-204, 208, and 500:
Upgrade to the latest version of ScreenOS (3.1.0r1 or later), available from the NetScreen Support Web site. See References.

For NetScreen-5:
Upgrade to the latest version of ScreenOS (2.6.1r6 or later), available from the NetScreen Support Web site. See References.

For NetScreen-5XP, 10, 100:
Upgrade to the latest version of ScreenOS (3.0.1r1 or later), available from the NetScreen Support Web site. See References.

For NetScreen-25 and 50:
Upgrade to the latest version of ScreenOS (3.0.0r1 or later), available from the NetScreen Support Web site. See References.

For NetScreen-1000:
Upgrade to the latest version of ScreenOS (2.8.0r1 or later), available from the NetScreen Support Web site. See References.

In addition to upgrading to the latest versions of ScreenOS, NetScreen users should refer to the BugTraq Mailing List posting dated Feb 5 2002 12:35PM for instructions on minimizing the likelihood of being affected by this vulnerability. See References.

References:

Platforms Affected:

  • Juniper NetScreen ScreenOS 1.6.4
  • Juniper NetScreen ScreenOS 1.6.6
  • Juniper NetScreen ScreenOS 1.64
  • Juniper NetScreen ScreenOS 1.66
  • Juniper NetScreen ScreenOS 1.7
  • Juniper NetScreen ScreenOS 1.73r1
  • Juniper NetScreen ScreenOS 1.73r2
  • Juniper NetScreen ScreenOS 2.0.1
  • Juniper NetScreen ScreenOS 2.0.1r8
  • Juniper NetScreen ScreenOS 2.1
  • Juniper NetScreen ScreenOS 2.5
  • Juniper NetScreen ScreenOS 2.5r1
  • Juniper NetScreen ScreenOS 2.5r2
  • Juniper NetScreen ScreenOS 2.5r6
  • Juniper NetScreen ScreenOS 2.6.0

Reported:

Feb 01, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page