Buffer overflow in NetScreen-Remote 8.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) large number of payloads, or (3) a long payload.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/287771 - US Government Resource | |
References | () http://www.netscreen.com/support/alerts/9_6_02.htm - | |
References | () http://www.securityfocus.com/bid/5668 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/9850 - |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2002-2223
Mitre link : CVE-2002-2223
CVE.ORG link : CVE-2002-2223
JSON object : View
Products Affected
juniper
- netscreen_remote_security_client
- netscreen_remote_vpn_client
CWE