{"vuid":"VU#930161","idnumber":"930161","name":"NetScreen Secure Command Shell (SCS) denial-of-service vulnerability","keywords":["NetScreen","DoS","denial of service","SSH1 CRC32 compensation attack","SCS"],"overview":"The Secure Command Shell service on NetScreen firewall products contains a remotely exploitable denial-of-service vulnerability.","clean_desc":"Firewall products from NetScreen Technologies, Inc. include a Secure Shell version 1 (SSHv1) implementation called Secure Command Shell (SCS). The SCS service contains a remotely exploitable denial-of-service vulnerability which can cause affected units to crash. According to the original reporter, programs which attempt to exploit  VU#945216 trigger the vulnerability and cause the unit to crash. NetScreen has confirmed this, but has stated that this vulnerability is not the same as VU#945216.","impact":"A remote attacker can cause the affected unit to crash. The original reporter indicates that the system may subsequently require a hard reboot.","resolution":"NetScreen has issued a patch for this vulnerability. Information about it can be found at\n http://www.netscreen.com/support/alerts/11_06_02.html","workarounds":"Workarounds If patches cannot be applied, NetScreen recommends disabling the SCS service on affected systems. Note that according to NetScreen the SCS service is not enabled by default. If the service cannot be disabled, limit access to the SSH service to only trusted hosts on the internal network.","sysaffected":"","thanks":"Thanks to Erik Parker of DigitalDefense for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.netscreen.com/support/alerts/11_06_02.html","http://online.securityfocus.com/archive/1/298274","http://online.securityfocus.com/archive/1/298288","http://online.securityfocus.com/archive/1/298289"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-11-01T20:32:46Z","publicdate":"2002-11-01T00:00:00Z","datefirstpublished":"2002-11-19T21:24:28Z","dateupdated":"2002-12-10T21:16:21Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.4","cam_scorecurrentwidelyknown":"6.3","cam_scorecurrentwidelyknownexploited":"10.8","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.4,"vulnote":null}