Summary
Detail | |||
---|---|---|---|
Vendor | Juniper | First view | 2014-01-23 |
Product | Screenos | Last view | 2018-01-10 |
Version | 6.3.0r1 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:juniper:screenos |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2018-01-10 | CVE-2018-0014 | Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25. |
8.1 | 2016-01-08 | CVE-2015-7754 | Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation. |
5 | 2015-10-19 | CVE-2015-7750 | The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a crafted L2TP packet. |
7.8 | 2014-06-13 | CVE-2014-3814 | The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP. |
7.8 | 2014-06-13 | CVE-2014-3813 | Unspecified vulnerability in the Juniper Networks NetScreen Firewall products with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via vectors related to a DNS lookup. |
7.8 | 2014-04-15 | CVE-2014-2842 | Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet. |
5.4 | 2014-01-23 | CVE-2013-7313 | The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
60% (3) | CWE-20 | Improper Input Validation |
20% (1) | CWE-399 | Resource Management Errors |
20% (1) | CWE-200 | Information Exposure |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-B-0082 | Multiple Denial of Service Vulnerabilities in Juniper NetScreen Firewall Severity: Category I - VMSKEY: V0052809 |
2014-B-0062 | Juniper ScreenOS Denial of Service Vulnerability Severity: Category I - VMSKEY: V0050901 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-12-21 | Name: The remote host is affected by a remote code execution vulnerability. File: screenos_JSA10712.nasl - Type: ACT_GATHER_INFO |
2015-10-26 | Name: The remote host is affected by a denial of service vulnerability. File: screenos_JSA10704.nasl - Type: ACT_GATHER_INFO |
2014-06-27 | Name: The remote host is affected by a denial of service vulnerability. File: screenos_JSA10631.nasl - Type: ACT_GATHER_INFO |
2014-06-27 | Name: The remote host is affected by a denial of service vulnerability. File: screenos_JSA10632.nasl - Type: ACT_GATHER_INFO |
2014-05-23 | Name: The remote host is affected by a denial of service vulnerability. File: screenos_JSA10624.nasl - Type: ACT_GATHER_INFO |
2013-08-02 | Name: The remote device is missing a vendor-supplied security patch. File: juniper_jsa10582.nasl - Type: ACT_GATHER_INFO |