CVE-2004-1446
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:41:23
NMCO    

[原文]Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.


[CNNVD]ScreenOS SSHv1实现远程拒绝服务漏洞(CNNVD-200412-665)

        
        Netscreen是一款防火墙安全解决方案,其操作系统为ScreenOS。
        Juniper Networks NetScreen防火墙SSHv1服务实现存在问题,远程攻击者可以利用这个漏洞使ScreenOS崩溃。
        恶意攻击者可以连接Netscreen防火墙的SSHv1服务,在验证之前对其进行拒绝服务攻击。防火墙会重新启动或挂起,停止正常的服务。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:juniper:netscreen_screenos:4.0.1r7Juniper NetScreen ScreenOS 4.0.1 r7
cpe:/o:juniper:netscreen_screenos:2.6.0Juniper NetScreen ScreenOS 2.6.0
cpe:/o:juniper:netscreen_screenos:2.1_r7
cpe:/o:juniper:netscreen_screenos:3.0.3_r1.1
cpe:/o:juniper:netscreen_screenos:3.0.0r1Juniper ScreenOS 3.0.0 r1
cpe:/o:juniper:netscreen_screenos:3.1.0Juniper NetScreen ScreenOS 3.1
cpe:/o:juniper:netscreen_screenos:3.1.0r10Juniper NetScreen ScreenOS 3.1 r10
cpe:/o:juniper:netscreen_screenos:1.73_r1
cpe:/o:juniper:netscreen_screenos:4.0.0r7Juniper NetScreen ScreenOS 4.0 r7
cpe:/o:juniper:netscreen_screenos:3.0.3r3Juniper NetScreen ScreenOS 3.0.3 r3
cpe:/o:juniper:netscreen_screenos:4.0.0r11Juniper NetScreen ScreenOS 4.0 r11
cpe:/o:juniper:netscreen_screenos:4.0.1r10Juniper NetScreen ScreenOS 4.0.1 r10
cpe:/o:juniper:netscreen_screenos:3.0.0r4Juniper ScreenOS 3.0.0 r4
cpe:/o:juniper:netscreen_screenos:3.1.0r8Juniper NetScreen ScreenOS 3.1 r8
cpe:/o:juniper:netscreen_screenos:4.0.0r4Juniper NetScreen ScreenOS 4.0 r4
cpe:/o:juniper:netscreen_screenos:2.8_r1
cpe:/o:juniper:netscreen_screenos:2.6.1r10Juniper NetScreen ScreenOS 2.6.1 r10
cpe:/o:juniper:netscreen_screenos:3.0.3r7Juniper NetScreen ScreenOS 3.0.3 r7
cpe:/o:juniper:netscreen_screenos:3.1.0r3Juniper NetScreen ScreenOS 3.1 r3
cpe:/o:juniper:netscreen_screenos:4.0.1r5Juniper NetScreen ScreenOS 4.0.1 r5
cpe:/o:juniper:netscreen_screenos:2.6.1r8Juniper NetScreen ScreenOS 2.6.1 r8
cpe:/o:juniper:netscreen_screenos:4.0.0r1Juniper NetScreen ScreenOS 4.0 r1
cpe:/o:juniper:netscreen_screenos:2.6.1r6Juniper NetScreen ScreenOS 2.6.1 r6
cpe:/o:juniper:netscreen_screenos:3.0.3r1Juniper NetScreen ScreenOS 3.0.3 r1
cpe:/o:juniper:netscreen_screenos:4.0.1r3Juniper NetScreen ScreenOS 4.0.1 r3
cpe:/o:juniper:netscreen_screenos:3.1.0r12Juniper NetScreen ScreenOS 3.1 r12
cpe:/o:juniper:netscreen_screenos:3.1.0r9Juniper NetScreen ScreenOS 3.1 r9
cpe:/o:juniper:netscreen_screenos:4.0.0r5Juniper NetScreen ScreenOS 4.0 r5
cpe:/o:juniper:netscreen_screenos:4.0.1r8Juniper NetScreen ScreenOS 4.0.1 r8
cpe:/o:juniper:netscreen_screenos:2.5r2Juniper NetScreen ScreenOS 2.5 r2
cpe:/o:juniper:netscreen_screenos:2.6.1r5Juniper NetScreen ScreenOS 2.6.1 r5
cpe:/o:juniper:netscreen_screenos:2.8Juniper NetScreen ScreenOS 2.8
cpe:/o:juniper:netscreen_screenos:3.0.1r4Juniper NetScreen ScreenOS 3.0.1 r4
cpe:/o:juniper:netscreen_screenos:2.7.1r3Juniper NetScreen ScreenOS 2.7.1 r3
cpe:/o:juniper:netscreen_screenos:2.6.1Juniper NetScreen ScreenOS 2.6.1
cpe:/o:juniper:netscreen_screenos:3.0.0r2Juniper ScreenOS 3.0.0 r2
cpe:/o:juniper:netscreen_screenos:2.1Juniper NetScreen ScreenOS 2.1
cpe:/o:juniper:netscreen_screenos:4.0.0r2Juniper NetScreen ScreenOS 4.0 r2
cpe:/o:juniper:netscreen_screenos:4.0.1r2Juniper NetScreen ScreenOS 4.0.1 r2
cpe:/o:juniper:netscreen_screenos:2.10_r4
cpe:/o:juniper:netscreen_screenos:3.0.3Juniper NetScreen ScreenOS 3.0.3
cpe:/o:juniper:netscreen_screenos:2.6.1r4Juniper NetScreen ScreenOS 2.6.1 r4
cpe:/o:juniper:netscreen_screenos:2.10_r3
cpe:/o:juniper:netscreen_screenos:4.0.0r10Juniper NetScreen ScreenOS 4.0 r10
cpe:/o:juniper:netscreen_screenos:3.1.0r6Juniper NetScreen ScreenOS 3.1 r6
cpe:/o:juniper:netscreen_screenos:4.0.0r3Juniper NetScreen ScreenOS 4.0 r3
cpe:/o:juniper:netscreen_screenos:1.73_r2
cpe:/o:juniper:netscreen_screenos:4.0.3Juniper NetScreen ScreenOS 4.0.3
cpe:/o:juniper:netscreen_screenos:2.5r6Juniper NetScreen ScreenOS 2.5 r6
cpe:/o:juniper:netscreen_screenos:2.1_r6
cpe:/o:juniper:netscreen_screenos:2.6.1r11Juniper NetScreen ScreenOS 2.6.1 r11
cpe:/o:juniper:netscreen_screenos:4.0.0r9Juniper NetScreen ScreenOS 4.0 r9
cpe:/o:juniper:netscreen_screenos:4.0.0r12Juniper NetScreen ScreenOS 4.0 r12
cpe:/o:juniper:netscreen_screenos:4.0.3r3Juniper NetScreen ScreenOS 4.0.3 r3
cpe:/o:juniper:netscreen_screenos:4.0.0r8Juniper NetScreen ScreenOS 4.0 r8
cpe:/o:juniper:netscreen_screenos:2.6.1r3Juniper NetScreen ScreenOS 2.6.1 r3
cpe:/o:juniper:netscreen_screenos:3.1.0r11Juniper NetScreen ScreenOS 3.1 r11
cpe:/o:juniper:netscreen_screenos:2.5r1Juniper NetScreen ScreenOS 2.5 r1
cpe:/o:juniper:netscreen_screenos:4.0.1r6Juniper NetScreen ScreenOS 4.0.1 r6
cpe:/o:juniper:netscreen_screenos:4.0.1r4Juniper NetScreen ScreenOS 4.0.1 r4
cpe:/o:juniper:netscreen_screenos:4.0.1Juniper NetScreen ScreenOS 4.0.1
cpe:/o:juniper:netscreen_screenos:1.7
cpe:/o:juniper:netscreen_screenos:3.0.0Juniper ScreenOS 3.0.0
cpe:/o:juniper:netscreen_screenos:3.0.2Juniper NetScreen ScreenOS 3.0.2
cpe:/o:juniper:netscreen_screenos:3.0.1r1Juniper NetScreen ScreenOS 3.0.1 r1
cpe:/o:juniper:netscreen_screenos:3.0.0r3Juniper ScreenOS 3.0.0 r3
cpe:/o:juniper:netscreen_screenos:4.0.3r1Juniper NetScreen ScreenOS 4.0.3 r1
cpe:/o:juniper:netscreen_screenos:2.6.1r2Juniper NetScreen ScreenOS 2.6.1 r2
cpe:/o:juniper:netscreen_screenos:4.0.1r1Juniper NetScreen ScreenOS 4.0.1 r1
cpe:/o:juniper:netscreen_screenos:3.0.3r8Juniper NetScreen ScreenOS 3.0.3 r8
cpe:/o:juniper:netscreen_screenos:4.0.3r4Juniper NetScreen ScreenOS 4.0.3 r4
cpe:/o:juniper:netscreen_screenos:2.7.1r1Juniper NetScreen ScreenOS 2.7.1 r1
cpe:/o:juniper:netscreen_screenos:2.7.1Juniper NetScreen ScreenOS 2.7.1
cpe:/o:juniper:netscreen_screenos:3.0.1Juniper NetScreen ScreenOS 3.0.1
cpe:/o:juniper:netscreen_screenos:4.0.0Juniper NetScreen ScreenOS 4.0
cpe:/o:juniper:netscreen_screenos:3.0.3r5Juniper NetScreen ScreenOS 3.0.3 r5
cpe:/o:juniper:netscreen_screenos:3.1.0r4Juniper NetScreen ScreenOS 3.1 r4
cpe:/o:juniper:netscreen_screenos:3.0.1r5Juniper NetScreen ScreenOS 3.0.1 r5
cpe:/o:juniper:netscreen_screenos:1.66_r2
cpe:/o:juniper:netscreen_screenos:3.1.0r2Juniper NetScreen ScreenOS 3.1 r2
cpe:/o:juniper:netscreen_screenos:5.0.0Juniper NetScreen ScreenOS 5.0
cpe:/o:juniper:netscreen_screenos:3.1.0r7Juniper NetScreen ScreenOS 3.1 r7
cpe:/o:juniper:netscreen_screenos:2.7.1r2Juniper NetScreen ScreenOS 2.7.1 r2
cpe:/o:juniper:netscreen_screenos:4.0.0::dial
cpe:/o:juniper:netscreen_screenos:1.64Juniper NetScreen ScreenOS 1.64
cpe:/o:juniper:netscreen_screenos:2.0.1_r8
cpe:/o:juniper:netscreen_screenos:3.0.3r4Juniper NetScreen ScreenOS 3.0.3 r4
cpe:/o:juniper:netscreen_screenos:3.0.1r7Juniper NetScreen ScreenOS 3.0.1 r7
cpe:/o:juniper:netscreen_screenos:2.6.1r12Juniper NetScreen ScreenOS 2.6.1 r12
cpe:/o:juniper:netscreen_screenos:4.0.0r6Juniper ScreenOS 4.0.0 r6
cpe:/o:juniper:netscreen_screenos:3.0.1r2Juniper NetScreen ScreenOS 3.0.1 r2
cpe:/o:juniper:netscreen_screenos:3.1.1_r2
cpe:/o:juniper:netscreen_screenos:3.0.3r2Juniper NetScreen ScreenOS 3.0.3 r2
cpe:/o:juniper:netscreen_screenos:4.0.3r2Juniper NetScreen ScreenOS 4.0.3 r2
cpe:/o:juniper:netscreen_screenos:3.0.1r6Juniper NetScreen ScreenOS 3.0.1 r6
cpe:/o:juniper:netscreen_screenos:2.6.1r9Juniper NetScreen ScreenOS 2.6.1 r9
cpe:/o:juniper:netscreen_screenos:1.66Juniper NetScreen ScreenOS 1.66
cpe:/o:juniper:netscreen_screenos:3.0.3r6Juniper NetScreen ScreenOS 3.0.3 r6
cpe:/o:juniper:netscreen_screenos:2.6.1r1Juniper NetScreen ScreenOS 2.6.1 r1
cpe:/o:juniper:netscreen_screenos:3.1.0r1Juniper NetScreen ScreenOS 3.1 r1
cpe:/o:juniper:netscreen_screenos:3.1.0r5Juniper NetScreen ScreenOS 3.1 r5
cpe:/o:juniper:netscreen_screenos:4.0.1r9Juniper NetScreen ScreenOS 4.0.1 r9
cpe:/o:juniper:netscreen_screenos:2.5Juniper NetScreen ScreenOS 2.5
cpe:/o:juniper:netscreen_screenos:4.0.2Juniper NetScreen ScreenOS 4.0.2
cpe:/o:juniper:netscreen_screenos:2.6.1r7Juniper NetScreen ScreenOS 2.6.1 r7
cpe:/o:juniper:netscreen_screenos:3.0.1r3Juniper NetScreen ScreenOS 3.0.1 r3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1446
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1446
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-665
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/749870
(UNKNOWN)  CERT-VN  VU#749870
http://www.securityfocus.com/bid/10854
(PATCH)  BID  10854
http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt
(PATCH)  CONFIRM  http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt
http://secunia.com/advisories/12208/
(PATCH)  SECUNIA  12208
http://xforce.iss.net/xforce/xfdb/16876
(UNKNOWN)  XF  netscreen-screenos-sshv1-dos(16876)

- 漏洞信息

ScreenOS SSHv1实现远程拒绝服务漏洞
中危 其他
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        Netscreen是一款防火墙安全解决方案,其操作系统为ScreenOS。
        Juniper Networks NetScreen防火墙SSHv1服务实现存在问题,远程攻击者可以利用这个漏洞使ScreenOS崩溃。
        恶意攻击者可以连接Netscreen防火墙的SSHv1服务,在验证之前对其进行拒绝服务攻击。防火墙会重新启动或挂起,停止正常的服务。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 关闭SSHv1服务。
        * 设置防火墙只允许可信IP连接。
        厂商补丁:
        NetScreen
        ---------
        供应商已经提供如下版本的补丁:
        5.0.0r8, 5.0.0r8.1, 4.0.0r13, 4.0.1r11, 4.0.3r8, 4.0.1-Dial2r5, 4.0.1-SBRr5, 4.0.1-IGMP3r4, 4.0.1-MCASTr2, and 3.0.3r9.
        用户可联系供应商获得补丁:
        
        http://www.juniper.net/support/

- 漏洞信息

8296
NetScreen ScreenOS Crafted SSHv1 Packet Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

ScreenOS contains a flaw that may allow a remote denial of service. The issue is triggered when specially crafted SSHv1 pre-authenticaion traffic occurs, and will result in loss of availability for the netscreen firewall.

- 时间线

2004-08-04 Unknow
2004-08-04 Unknow

- 解决方案

Upgrade to applicable version: 5.0.0r8, 5.0.0r8.1, 4.0.0r13, 4.0.1r11, 4.0.3r8, 4.0.1-Dial2r5, 4.0.1-SBRr5, 4.0.1-IGMP3r4, 4.0.1-MCASTr2, 3.0.3r9 or higher, as they has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following as a workaround: users can disable sshv1 traffic capability to alleviate this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站