Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/10449.php | |
http://www.kb.cert.org/vuls/id/539363 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6023 | |
http://www.iss.net/security_center/static/10449.php | |
http://www.kb.cert.org/vuls/id/539363 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6023 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/10449.php - | |
References | () http://www.kb.cert.org/vuls/id/539363 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/6023 - |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:42
NVD link : CVE-2002-2150
Mitre link : CVE-2002-2150
CVE.ORG link : CVE-2002-2150
JSON object : View
Products Affected
juniper
- netscreen_screenos
CWE