Vulnerability Name:

CVE-2002-0234 (CCN-8057)

Assigned:2002-02-01
Published:2002-02-01
Updated:2016-10-18
Summary:NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Fri Feb 01 2002 - 09:06:49 CST
NetScreen ScreenOS 2.6 Subject to Trust Interface DoS

Source: CCN
Type: BugTraq Mailing List, Fri Feb 01 2002 - 12:27:11 CST
RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS

Source: CCN
Type: BugTraq Mailing List, Tue Feb 05 2002 - 15:35:20 CST
NetScreen Response to ScreenOS Port Scan DoS Vulnerability

Source: MITRE
Type: CNA
CVE-2002-0234

Source: BUGTRAQ
Type: UNKNOWN
20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS

Source: BUGTRAQ
Type: UNKNOWN
20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS

Source: BUGTRAQ
Type: Vendor Advisory
20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability

Source: XF
Type: Patch, Vendor Advisory
netscreen-screenos-scan-dos(8057)

Source: CCN
Type: NetScreen Support Web site
Support & Services

Source: CCN
Type: OSVDB ID: 4726
NetScreen ScreenOS Port Scan DoS

Source: BID
Type: Patch, Vendor Advisory
4015

Source: CCN
Type: BID-4015
NetScreen ScreenOS Port Scan DoS Vulnerability

Source: XF
Type: UNKNOWN
netscreen-screenos-scan-dos(8057)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:netscreen_screenos:*:*:*:*:*:*:*:* (Version <= 2.6.1)

  • Configuration CCN 1:
  • cpe:/o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper netscreen screenos *
    juniper netscreen screenos 2.5
    juniper netscreen screenos 1.64
    juniper netscreen screenos 1.66
    juniper netscreen screenos 2.1
    juniper netscreen screenos 2.5r1
    juniper netscreen screenos 2.5r2
    juniper netscreen screenos 2.5r6
    juniper netscreen screenos 2.6.0
    juniper netscreen screenos 1.7