Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Juniper ScreenOS Vendors:   Juniper
ScreenOS Can Be Crashed By Remote Users Due to an SSHv1 Implementation Bug
SecurityTracker Alert ID:  1010848
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 3 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 5.0.0r8.
Description:   A vulnerability was reported in ScreenOS in the processing of SSHv1 management connections. A remote user can cause the device to crash.

It is reported that if SSH version 1 is enabled on the target device, a remote user can connect to the management port and cause the device to hang or to crash and reboot. Authentication is not required.

The vendor indicates that systems with SSH disabled or SSHv2 enabled are not affected.

Impact:   A remote user can cause the target device to hang or to crash and then reboot.
Solution:   The vendor has issued the following fixed versions:

5.0.0r8, 5.0.0r8.1, 4.0.0r13, 4.0.1r11, 4.0.3r8, 4.0.1-Dial2r5, 4.0.1-SBRr5, 4.0.1-IGMP3r4, 4.0.1-MCASTr2, and 3.0.3r9.

The fixes are available at:

Vendor URL: (Links to External Site)
Cause:   Exception handling error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC