{"vuid":"VU#749870","idnumber":"749870","name":"Juniper Networks NetScreen firewall contains a DoS vulnerability in the SSHv1 service","keywords":["Juniper Networks","NetScreen","ScreenOS","DoS","denial of service","SSHv1"],"overview":"A vulnerability in the SSHv1 service of NetScreen firewalls could allow an attacker to cause a denial-of-service condition.","clean_desc":"Juniper Networks NetScreen firewall products include a Secure Shell version 1 (SSHv1) implementation called Secure Command Shell (SCS). The SSHv1 service contains a remotely exploitable denial-of-service vulnerability. According to the Juniper Networks Security Advisory: A malicious person who can connect to the SSHv1 service on a Juniper Networks Netscreen firewall can crash the device before having to authenticate. Upon execution of the attack, the firewall will reboot or hang, which will prevent traffic to flow through the device.","impact":"A remote, unauthenticated attacker could cause a denial-of-service condition.","resolution":"Upgrade\nPlease refer to the \"Recommended Actions\" section of the Juniper Networks Advisory for more information on upgrading.","workarounds":"Disable SSHv1 Disable SSHv1 and manage the affected device using another method, such as HTTPS. Restrict Access Block or restrict access to the SSHv1 service from untrusted networks, such as the Internet. Juniper Networks also recommends enabling IP Spoof protection to provide additional security.","sysaffected":"","thanks":"This vulnerability was reported by Juniper Networks. In turn, Juniper Networks credits Mark Ellzey Thomas of \nNaviSite\n for discovering this vulnerability.","author":"This document was written by Damon Morda based on information provided by Juniper Networks.","public":["http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt","http://www.securitytracker.com/alerts/2004/Aug/1010848.html","http://secunia.com/advisories/12208/","http://www.juniper.net/netscreen_com.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-04T18:12:01Z","publicdate":"2004-08-03T00:00:00Z","datefirstpublished":"2004-08-13T15:03:53Z","dateupdated":"2004-08-13T16:56:55Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"7","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.62","cam_scorecurrentwidelyknown":"5.67","cam_scorecurrentwidelyknownexploited":"9.87","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.62,"vulnote":null}