Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Juniper NSM Vendors:   Juniper, NetScreen
Juniper NetScreen-Security Manager 'guiSrv' and 'devSrv' Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1015417
SecurityTracker URL:
CVE Reference:   CVE-2005-4587   (Links to External Site)
Updated:  Jan 19 2006
Original Entry Date:  Dec 28 2005
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2004 FP2 and FP3
Description:   A vulnerability was reported in Juniper NetScreen-Security Manager. A remote user can cause denial of service conditions.

A remote user can send specially crafted, long strings to the guiSrv process (on port 7800) and devSrv process (on port 7801) to cause the services to become unavailable.

The services will be restarted by default via a watchdog service that runs periodically [every 5 minutes in the test configuration].

David Maciejak reported this vulnerability.

Impact:   A remote user can cause certain services to become unavailable.
Solution:   The vendor has released a fixed version (NSM FP4r1, also known as 2005.1).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (NT), Windows (2000), Windows (XP)

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] Juniper NSM remote Denial Of Service

Juniper NSM remote Denial Of Service

"NetScreen-Security Manager is a software that enables you to integrate and
centralize management of your Juniper Networks NetScreen security environment."

More information can be found on


Malicious user can cause a remote denial of service on
guiSrv(port 7800) and devSrv(port 7801) by sending specially
crafted and long strings.

NSM 2004 FP2 and FP3 are known to be vulnerable.

By default, a watchdog service is installed with NSM. 
It is able to restart automatically dead services
(the test is about every 5 min).

Proof of Concept:

I am not intent to publicly disclose the PoC.


Upgrade at least to NSM FP4r1 also known as 2005.1

Thanks to quick responses from Juniper Security Team.

David Maciejak

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC