The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP.
References
Link | Resource |
---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632 | Vendor Advisory |
http://secunia.com/advisories/59026 | |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632 | Vendor Advisory |
http://secunia.com/advisories/59026 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632 - Vendor Advisory | |
References | () http://secunia.com/advisories/59026 - |
Information
Published : 2014-06-13 14:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3814
Mitre link : CVE-2014-3814
CVE.ORG link : CVE-2014-3814
JSON object : View
Products Affected
juniper
- netscreen-5400
- netscreen-5200
- screenos
CWE
CWE-20
Improper Input Validation