Description
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
Product(s):
- Juniper NetScreen ScreenOS 1.64
- Juniper NetScreen ScreenOS 1.66
- Juniper NetScreen ScreenOS 1.66 R2
- Juniper NetScreen ScreenOS 1.73 R1
- Juniper NetScreen ScreenOS 1.73 R2
- Juniper NetScreen ScreenOS 1.7
- Juniper NetScreen ScreenOS 2.0.1 R8
- Juniper NetScreen ScreenOS 2.10 R3
- Juniper NetScreen ScreenOS 2.10 R4
- Juniper NetScreen ScreenOS 2.1
- Juniper NetScreen ScreenOS 2.1 R6
- Juniper NetScreen ScreenOS 2.1 R7
- Juniper NetScreen ScreenOS 2.5
- Juniper NetScreen ScreenOS 2.5 r1
- Juniper NetScreen ScreenOS 2.5 r2
- Juniper NetScreen ScreenOS 2.5 r6
- Juniper NetScreen ScreenOS 2.6.0
- Juniper NetScreen ScreenOS 2.6.1
- Juniper NetScreen ScreenOS 2.6.1 r10
- Juniper NetScreen ScreenOS 2.6.1 r11
- Juniper NetScreen ScreenOS 2.6.1 r12
- Juniper NetScreen ScreenOS 2.6.1 r1
- Juniper NetScreen ScreenOS 2.6.1 r2
- Juniper NetScreen ScreenOS 2.6.1 r3
- Juniper NetScreen ScreenOS 2.6.1 r4
- Juniper NetScreen ScreenOS 2.6.1 r5
- Juniper NetScreen ScreenOS 2.6.1 r6
- Juniper NetScreen ScreenOS 2.6.1 r7
- Juniper NetScreen ScreenOS 2.6.1 r8
- Juniper NetScreen ScreenOS 2.6.1 r9
- Juniper NetScreen ScreenOS 2.7.1
- Juniper NetScreen ScreenOS 2.7.1 r1
- Juniper NetScreen ScreenOS 2.7.1 r2
- Juniper NetScreen ScreenOS 2.7.1 r3
- Juniper NetScreen ScreenOS 2.8
- Juniper NetScreen ScreenOS 2.8 R1
- Juniper ScreenOS 3.0.0
- Juniper ScreenOS 3.0.0 r1
- Juniper ScreenOS 3.0.0 r2
- Juniper ScreenOS 3.0.0 r3
- Juniper ScreenOS 3.0.0 r4
- Juniper NetScreen ScreenOS 3.0.1
- Juniper NetScreen ScreenOS 3.0.1 r1
- Juniper NetScreen ScreenOS 3.0.1 r2
- Juniper NetScreen ScreenOS 3.0.1 r3
- Juniper NetScreen ScreenOS 3.0.1 r4
- Juniper NetScreen ScreenOS 3.0.1 r5
- Juniper NetScreen ScreenOS 3.0.1 r6
- Juniper NetScreen ScreenOS 3.0.1 r7
- Juniper NetScreen ScreenOS 3.0.2
- Juniper NetScreen ScreenOS 3.0.3
- Juniper NetScreen ScreenOS 3.0.3 R1.1
- Juniper NetScreen ScreenOS 3.0.3 r1
- Juniper NetScreen ScreenOS 3.0.3 r2
- Juniper NetScreen ScreenOS 3.0.3 r3
- Juniper NetScreen ScreenOS 3.0.3 r4
- Juniper NetScreen ScreenOS 3.0.3 r5
- Juniper NetScreen ScreenOS 3.0.3 r6
- Juniper NetScreen ScreenOS 3.0.3 r7
- Juniper NetScreen ScreenOS 3.0.3 r8
- Juniper NetScreen ScreenOS 3.1
- Juniper NetScreen ScreenOS 3.1 r10
- Juniper NetScreen ScreenOS 3.1 r11
- Juniper NetScreen ScreenOS 3.1 r12
- Juniper NetScreen ScreenOS 3.1 r1
- Juniper NetScreen ScreenOS 3.1 r2
- Juniper NetScreen ScreenOS 3.1 r3
- Juniper NetScreen ScreenOS 3.1 r4
- Juniper NetScreen ScreenOS 3.1 r5
- Juniper NetScreen ScreenOS 3.1 r6
- Juniper NetScreen ScreenOS 3.1 r7
- Juniper NetScreen ScreenOS 3.1 r8
- Juniper NetScreen ScreenOS 3.1 r9
- Juniper NetScreen ScreenOS 3.1.1_R2
- Juniper NetScreen ScreenOS 4.0
- Juniper NetScreen ScreenOS 4.0.0 with Dial
- Juniper NetScreen ScreenOS 4.0 r10
- Juniper NetScreen ScreenOS 4.0 r11
- Juniper NetScreen ScreenOS 4.0 r12
- Juniper NetScreen ScreenOS 4.0 r1
- Juniper NetScreen ScreenOS 4.0 r2
- Juniper NetScreen ScreenOS 4.0 r3
- Juniper NetScreen ScreenOS 4.0 r4
- Juniper NetScreen ScreenOS 4.0 r5
- Juniper ScreenOS 4.0.0 r6
- Juniper NetScreen ScreenOS 4.0 r7
- Juniper NetScreen ScreenOS 4.0 r8
- Juniper NetScreen ScreenOS 4.0 r9
- Juniper NetScreen ScreenOS 4.0.1
- Juniper NetScreen ScreenOS 4.0.1 r10
- Juniper NetScreen ScreenOS 4.0.1 r1
- Juniper NetScreen ScreenOS 4.0.1 r2
- Juniper NetScreen ScreenOS 4.0.1 r3
- Juniper NetScreen ScreenOS 4.0.1 r4
- Juniper NetScreen ScreenOS 4.0.1 r5
- Juniper NetScreen ScreenOS 4.0.1 r6
- Juniper NetScreen ScreenOS 4.0.1 r7
- Juniper NetScreen ScreenOS 4.0.1 r8
- Juniper NetScreen ScreenOS 4.0.1 r9
- Juniper NetScreen ScreenOS 4.0.2
- +6 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1446, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1446 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.