NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service

NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service

漏洞ID 1054062 漏洞类型
发布时间 2003-07-29 更新时间 2003-07-29
图片[1]-NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22970
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8302/info

NetScreen ScreenOS has been reported prone to a vulnerability that may allow a remote user to trigger a denial of service condition in an affected appliance.

It has been reported that by modifying system configuration values that control the TCP window size, an attacker may connect to and trigger a denial of service in an appliance that is running a vulnerable version of ScreenOS.

This issue only affects some ScreenOS 4.0.1rx and 4.0.3rx releases. NetScreen IDP, NetScreen Firewall/VPN products running ScreenOS 3.x and earlier, 4.0.0, and 4.0.2 are not vulnerable. The vendor has supplied upgrades for affected versions.

Modifying registry values on a Windows 2000 system, to reflect the proof of concept below, and connecting to an affected appliance is sufficient to demonstrate the issue:

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParameters
New DWORD Value

Tcp1323Opts
HEX
3

相关推荐: Majordomo Config-file admin_password Configuration Vulnerability

Majordomo Config-file admin_password Configuration Vulnerability 漏洞ID 1103650 漏洞类型 Configuration Error 发布时间 2000-12-01 更新时间 2000-1…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享