This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Juniper First view 2014-01-23
Product Screenos Last view 2018-01-10
Version 6.3.0r1 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:juniper:screenos

Activity : Overall

Related : CVE

  Date Alert Description
6.5 2018-01-10 CVE-2018-0014

Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25.

8.1 2016-01-08 CVE-2015-7754

Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation.

5 2015-10-19 CVE-2015-7750

The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a crafted L2TP packet.

7.8 2014-06-13 CVE-2014-3814

The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP.

7.8 2014-06-13 CVE-2014-3813

Unspecified vulnerability in the Juniper Networks NetScreen Firewall products with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via vectors related to a DNS lookup.

7.8 2014-04-15 CVE-2014-2842

Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet.

5.4 2014-01-23 CVE-2013-7313

The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.

CWE : Common Weakness Enumeration

%idName
60% (3) CWE-20 Improper Input Validation
20% (1) CWE-399 Resource Management Errors
20% (1) CWE-200 Information Exposure

Information Assurance Vulnerability Management (IAVM)

id Description
2014-B-0082 Multiple Denial of Service Vulnerabilities in Juniper NetScreen Firewall
Severity: Category I - VMSKEY: V0052809
2014-B-0062 Juniper ScreenOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0050901

Nessus® Vulnerability Scanner

id Description
2015-12-21 Name: The remote host is affected by a remote code execution vulnerability.
File: screenos_JSA10712.nasl - Type: ACT_GATHER_INFO
2015-10-26 Name: The remote host is affected by a denial of service vulnerability.
File: screenos_JSA10704.nasl - Type: ACT_GATHER_INFO
2014-06-27 Name: The remote host is affected by a denial of service vulnerability.
File: screenos_JSA10631.nasl - Type: ACT_GATHER_INFO
2014-06-27 Name: The remote host is affected by a denial of service vulnerability.
File: screenos_JSA10632.nasl - Type: ACT_GATHER_INFO
2014-05-23 Name: The remote host is affected by a denial of service vulnerability.
File: screenos_JSA10624.nasl - Type: ACT_GATHER_INFO
2013-08-02 Name: The remote device is missing a vendor-supplied security patch.
File: juniper_jsa10582.nasl - Type: ACT_GATHER_INFO