SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Juniper ScreenOS Vendors:   NetScreen
NetScreen Denial of Service Bug May Let Remote Users Cause the Device Configuration to Erase
SecurityTracker Alert ID:  1006261
SecurityTracker URL:  http://securitytracker.com/id/1006261
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 10 2003
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.0.0 (5XP and 5XT only)
Description:   A denial of service vulnerability was reported in the NetScreen 5XP and 5XT devices. A remote user could, in certain situations, cause the device to reset and lose its current configuration.

NetScreen issued a security alert warning customers of a problem that could cause the configuration to be lost. It is reported that the device will revert to factory settings while under heavy load and during very specific circumstances. While under heavy load, in rare occasions the device will revert to factory settings. The specific circumstances required to replicate the condition were not described.

According to the vendor, the factory settings will provide network address translation (NAT) for all outbound traffic from the trusted interface to the untrusted interface and will reject all incoming traffic. Because the default route will be wiped out, hosts on the trusted interface will not be able to access external networks via the device.

NetScreen has identified this as a "High" risk alert.

Impact:   A remote user may be able to cause the device to reset to the factory default configuration. This would effectively block all communications.
Solution:   The vendor has released the following fixes:

NetScreen-5XP:

4.0.0: r11
4.0.1: r4
4.0.2: r3

NetScreen-5XT:

4.0.0: r11
4.0.0-DIAL: r3
4.0.1: r4
4.0.2: r3

If you have a different release of ScreenOS, contact:

support@netscreen.com

For information on obtaining updates, see:

http://www.netscreen.com/support/alerts/03_06_03.html

Vendor URL:  www.netscreen.com/support/alerts/03_06_03.html (Links to External Site)
Cause:   Exception handling error

Message History:   None.


 Source Message Contents

Subject:  NetScreen Security Alert 56305


http://www.netscreen.com/support/alerts/03_06_03.html

NetScreen issued a security alert (56305) warning customers of a bug in the NetScreen 5XP / 5XT
device (running ScreenOS 4.0.0 or later) that could cause the configuration to be lost.

NetScreen has identified this as a "High" maximum risk alert.

It is reported that the device will revert to factory settings while under heavy load and during
very specific circumstances. While under heavy load, in rare occasions the device will revert to
factory settings.  According to the vendor, the factory settings will provide network address
translation (NAT) for all outbound traffic from the trusted interface to the untrusted interface and
will reject all incoming traffic.  Because the default route will be wiped out, hosts on the trusted
interface will not be able to access external networks via the device.

The vendor has released the following fixes:

NetScreen-5XP:

4.0.0: r11
4.0.1: r4
4.0.2: r3

NetScreen-5XT:

4.0.0: r11
4.0.0-DIAL: r3
4.0.1: r4
4.0.2: r3

If you have a different release of ScreenOS, contact:

support@netscreen.com

For information on obtaining updates, see:

http://www.netscreen.com/support/alerts/03_06_03.html


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC