CVE-2002-2223

Buffer overflow in NetScreen-Remote 8.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) large number of payloads, or (3) a long payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:juniper:netscreen_remote_security_client:8.0:*:*:*:*:*:*:*
cpe:2.3:a:juniper:netscreen_remote_vpn_client:8.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:43

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/287771 - US Government Resource () http://www.kb.cert.org/vuls/id/287771 - US Government Resource
References () http://www.netscreen.com/support/alerts/9_6_02.htm - () http://www.netscreen.com/support/alerts/9_6_02.htm -
References () http://www.securityfocus.com/bid/5668 - () http://www.securityfocus.com/bid/5668 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/9850 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/9850 -

Information

Published : 2002-12-31 05:00

Updated : 2024-11-20 23:43


NVD link : CVE-2002-2223

Mitre link : CVE-2002-2223

CVE.ORG link : CVE-2002-2223


JSON object : View

Products Affected

juniper

  • netscreen_remote_security_client
  • netscreen_remote_vpn_client