Description
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name.
Products
- Juniper NetScreen ScreenOS 2.10 R3
- Juniper NetScreen ScreenOS 2.10 R4
- Juniper NetScreen ScreenOS 2.5
- Juniper NetScreen ScreenOS 2.5 r1
- Juniper NetScreen ScreenOS 2.5 r2
- Juniper NetScreen ScreenOS 2.5 r6
- Juniper NetScreen ScreenOS 2.6.1
- Juniper NetScreen ScreenOS 2.6.1 r1
- Juniper NetScreen ScreenOS 2.6.1 r2
- Juniper NetScreen ScreenOS 2.6.1 r3
- Juniper NetScreen ScreenOS 2.6.1 r4
- Juniper NetScreen ScreenOS 2.6.1 r5
- Juniper NetScreen ScreenOS 2.7.1
- Juniper NetScreen ScreenOS 2.7.1 r1
- Juniper NetScreen ScreenOS 2.7.1 r2
- Juniper NetScreen ScreenOS 2.7.1 r3
- Juniper NetScreen ScreenOS 2.8 R1
- Juniper ScreenOS 3.0.0
- Juniper ScreenOS 3.0.0 r1
- Juniper ScreenOS 3.0.0 r2
- Juniper ScreenOS 3.0.0 r3
- Juniper ScreenOS 3.0.0 r4
- Juniper NetScreen ScreenOS 3.0.1 r1
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-0891, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-0891 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References