| Vulnerability Name: | CVE-2002-0234 (CCN-8057) | ||||||||
| Assigned: | 2002-02-01 | ||||||||
| Published: | 2002-02-01 | ||||||||
| Updated: | 2016-10-18 | ||||||||
| Summary: | NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. | ||||||||
| CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
| CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Fri Feb 01 2002 - 09:06:49 CST NetScreen ScreenOS 2.6 Subject to Trust Interface DoS Source: CCN Type: BugTraq Mailing List, Fri Feb 01 2002 - 12:27:11 CST RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS Source: CCN Type: BugTraq Mailing List, Tue Feb 05 2002 - 15:35:20 CST NetScreen Response to ScreenOS Port Scan DoS Vulnerability Source: MITRE Type: CNA CVE-2002-0234 Source: BUGTRAQ Type: UNKNOWN 20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS Source: BUGTRAQ Type: UNKNOWN 20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS Source: BUGTRAQ Type: Vendor Advisory 20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability Source: XF Type: Patch, Vendor Advisory netscreen-screenos-scan-dos(8057) Source: CCN Type: NetScreen Support Web site Support & Services Source: CCN Type: OSVDB ID: 4726 NetScreen ScreenOS Port Scan DoS Source: BID Type: Patch, Vendor Advisory 4015 Source: CCN Type: BID-4015 NetScreen ScreenOS Port Scan DoS Vulnerability Source: XF Type: UNKNOWN netscreen-screenos-scan-dos(8057) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||