First published: Fri Jun 13 2014(Updated: )
The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper ScreenOS | <=6.3.0 | |
Juniper ScreenOS | =6.0.0 | |
Juniper ScreenOS | =6.1.0 | |
Juniper ScreenOS | =6.2.0 | |
Juniper Netscreen-5200 | ||
Juniper Netscreen-5400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.