Lucene search

K
cveMitreCVE-2004-1446
HistoryFeb 13, 2005 - 5:00 a.m.

CVE-2004-1446

2005-02-1305:00:00
mitre
web.nvd.nist.gov
32
cve-2004-1446
vulnerability
juniper
netscreen firewall
denial of service
ssh
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7

Confidence

High

EPSS

0.017

Percentile

87.7%

Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.

Affected configurations

Nvd
Node
junipernetscreen_screenosMatch1.7
OR
junipernetscreen_screenosMatch1.64
OR
junipernetscreen_screenosMatch1.66
OR
junipernetscreen_screenosMatch1.66_r2
OR
junipernetscreen_screenosMatch1.73_r1
OR
junipernetscreen_screenosMatch1.73_r2
OR
junipernetscreen_screenosMatch2.0.1_r8
OR
junipernetscreen_screenosMatch2.1
OR
junipernetscreen_screenosMatch2.1_r6
OR
junipernetscreen_screenosMatch2.1_r7
OR
junipernetscreen_screenosMatch2.5
OR
junipernetscreen_screenosMatch2.5r1
OR
junipernetscreen_screenosMatch2.5r2
OR
junipernetscreen_screenosMatch2.5r6
OR
junipernetscreen_screenosMatch2.6.0
OR
junipernetscreen_screenosMatch2.6.1
OR
junipernetscreen_screenosMatch2.6.1r1
OR
junipernetscreen_screenosMatch2.6.1r2
OR
junipernetscreen_screenosMatch2.6.1r3
OR
junipernetscreen_screenosMatch2.6.1r4
OR
junipernetscreen_screenosMatch2.6.1r5
OR
junipernetscreen_screenosMatch2.6.1r6
OR
junipernetscreen_screenosMatch2.6.1r7
OR
junipernetscreen_screenosMatch2.6.1r8
OR
junipernetscreen_screenosMatch2.6.1r9
OR
junipernetscreen_screenosMatch2.6.1r10
OR
junipernetscreen_screenosMatch2.6.1r11
OR
junipernetscreen_screenosMatch2.6.1r12
OR
junipernetscreen_screenosMatch2.7.1
OR
junipernetscreen_screenosMatch2.7.1r1
OR
junipernetscreen_screenosMatch2.7.1r2
OR
junipernetscreen_screenosMatch2.7.1r3
OR
junipernetscreen_screenosMatch2.8
OR
junipernetscreen_screenosMatch2.8_r1
OR
junipernetscreen_screenosMatch2.10_r3
OR
junipernetscreen_screenosMatch2.10_r4
OR
junipernetscreen_screenosMatch3.0.0
OR
junipernetscreen_screenosMatch3.0.0r1
OR
junipernetscreen_screenosMatch3.0.0r2
OR
junipernetscreen_screenosMatch3.0.0r3
OR
junipernetscreen_screenosMatch3.0.0r4
OR
junipernetscreen_screenosMatch3.0.1
OR
junipernetscreen_screenosMatch3.0.1r1
OR
junipernetscreen_screenosMatch3.0.1r2
OR
junipernetscreen_screenosMatch3.0.1r3
OR
junipernetscreen_screenosMatch3.0.1r4
OR
junipernetscreen_screenosMatch3.0.1r5
OR
junipernetscreen_screenosMatch3.0.1r6
OR
junipernetscreen_screenosMatch3.0.1r7
OR
junipernetscreen_screenosMatch3.0.2
OR
junipernetscreen_screenosMatch3.0.3
OR
junipernetscreen_screenosMatch3.0.3_r1.1
OR
junipernetscreen_screenosMatch3.0.3r1
OR
junipernetscreen_screenosMatch3.0.3r2
OR
junipernetscreen_screenosMatch3.0.3r3
OR
junipernetscreen_screenosMatch3.0.3r4
OR
junipernetscreen_screenosMatch3.0.3r5
OR
junipernetscreen_screenosMatch3.0.3r6
OR
junipernetscreen_screenosMatch3.0.3r7
OR
junipernetscreen_screenosMatch3.0.3r8
OR
junipernetscreen_screenosMatch3.1.0
OR
junipernetscreen_screenosMatch3.1.0r1
OR
junipernetscreen_screenosMatch3.1.0r2
OR
junipernetscreen_screenosMatch3.1.0r3
OR
junipernetscreen_screenosMatch3.1.0r4
OR
junipernetscreen_screenosMatch3.1.0r5
OR
junipernetscreen_screenosMatch3.1.0r6
OR
junipernetscreen_screenosMatch3.1.0r7
OR
junipernetscreen_screenosMatch3.1.0r8
OR
junipernetscreen_screenosMatch3.1.0r9
OR
junipernetscreen_screenosMatch3.1.0r10
OR
junipernetscreen_screenosMatch3.1.0r11
OR
junipernetscreen_screenosMatch3.1.0r12
OR
junipernetscreen_screenosMatch3.1.1_r2
OR
junipernetscreen_screenosMatch4.0.0
OR
junipernetscreen_screenosMatch4.0.0dial
OR
junipernetscreen_screenosMatch4.0.0r1
OR
junipernetscreen_screenosMatch4.0.0r2
OR
junipernetscreen_screenosMatch4.0.0r3
OR
junipernetscreen_screenosMatch4.0.0r4
OR
junipernetscreen_screenosMatch4.0.0r5
OR
junipernetscreen_screenosMatch4.0.0r6
OR
junipernetscreen_screenosMatch4.0.0r7
OR
junipernetscreen_screenosMatch4.0.0r8
OR
junipernetscreen_screenosMatch4.0.0r9
OR
junipernetscreen_screenosMatch4.0.0r10
OR
junipernetscreen_screenosMatch4.0.0r11
OR
junipernetscreen_screenosMatch4.0.0r12
OR
junipernetscreen_screenosMatch4.0.1
OR
junipernetscreen_screenosMatch4.0.1r1
OR
junipernetscreen_screenosMatch4.0.1r2
OR
junipernetscreen_screenosMatch4.0.1r3
OR
junipernetscreen_screenosMatch4.0.1r4
OR
junipernetscreen_screenosMatch4.0.1r5
OR
junipernetscreen_screenosMatch4.0.1r6
OR
junipernetscreen_screenosMatch4.0.1r7
OR
junipernetscreen_screenosMatch4.0.1r8
OR
junipernetscreen_screenosMatch4.0.1r9
OR
junipernetscreen_screenosMatch4.0.1r10
OR
junipernetscreen_screenosMatch4.0.2
OR
junipernetscreen_screenosMatch4.0.3
OR
junipernetscreen_screenosMatch4.0.3r1
OR
junipernetscreen_screenosMatch4.0.3r2
OR
junipernetscreen_screenosMatch4.0.3r3
OR
junipernetscreen_screenosMatch4.0.3r4
OR
junipernetscreen_screenosMatch5.0.0
VendorProductVersionCPE
junipernetscreen_screenos1.7cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*
junipernetscreen_screenos1.64cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*
junipernetscreen_screenos1.66cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*
junipernetscreen_screenos1.66_r2cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*
junipernetscreen_screenos1.73_r1cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*
junipernetscreen_screenos1.73_r2cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*
junipernetscreen_screenos2.0.1_r8cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*
junipernetscreen_screenos2.1cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*
junipernetscreen_screenos2.1_r6cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*
junipernetscreen_screenos2.1_r7cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*
Rows per page:
1-10 of 1061

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7

Confidence

High

EPSS

0.017

Percentile

87.7%

Related for CVE-2004-1446