var-200210-0192
Vulnerability from variot
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name. This condition may be the result of an unchecked buffer, which may potentially allow the attacker to execute arbitrary code. This possibility has not been confirmed. Netscreen is a firewall security solution that enables wire-speed packet processing
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200210-0192", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.8_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.5r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r2" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.8" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r2", "scope": "ne", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" } ], "sources": [ { "db": "BID", "id": "4842" }, { "db": "CNNVD", "id": "CNNVD-200210-215" }, { "db": "NVD", "id": "CVE-2002-0891" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "quentyn@fotango.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200210-215" } ], "trust": 0.6 }, "cve": "CVE-2002-0891", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2002-0891", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-5281", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-0891", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200210-215", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-5281", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-5281" }, { "db": "CNNVD", "id": "CNNVD-200210-215" }, { "db": "NVD", "id": "CVE-2002-0891" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name. \nThis condition may be the result of an unchecked buffer, which may potentially allow the attacker to execute arbitrary code. This possibility has not been confirmed. Netscreen is a firewall security solution that enables wire-speed packet processing", "sources": [ { "db": "NVD", "id": "CVE-2002-0891" }, { "db": "BID", "id": "4842" }, { "db": "VULHUB", "id": "VHN-5281" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "4842", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2002-0891", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200210-215", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20020527 NETSCREEN 25 UNAUTHORISED REBOOT ISSUE", "trust": 0.6 }, { "db": "XF", "id": "9186", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-5281", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-5281" }, { "db": "BID", "id": "4842" }, { "db": "CNNVD", "id": "CNNVD-200210-215" }, { "db": "NVD", "id": "CVE-2002-0891" } ] }, "id": "VAR-200210-0192", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5281" } ], "trust": 0.01 }, "last_update_date": "2024-11-22T22:58:41.498000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0891" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.securityfocus.com/bid/4842" }, { "trust": 2.7, "url": "http://online.securityfocus.com/archive/1/274240" }, { "trust": 2.7, "url": "http://www.netscreen.com/support/ns25_reboot.html" }, { "trust": 2.7, "url": "http://www.iss.net/security_center/static/9186.php" }, { "trust": 0.3, "url": "http://www.netscreen.com/index.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5281" }, { "db": "BID", "id": "4842" }, { "db": "CNNVD", "id": "CNNVD-200210-215" }, { "db": "NVD", "id": "CVE-2002-0891" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-5281" }, { "db": "BID", "id": "4842" }, { "db": "CNNVD", "id": "CNNVD-200210-215" }, { "db": "NVD", "id": "CVE-2002-0891" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-10-04T00:00:00", "db": "VULHUB", "id": "VHN-5281" }, { "date": "2002-05-27T00:00:00", "db": "BID", "id": "4842" }, { "date": "2002-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200210-215" }, { "date": "2002-10-04T04:00:00", "db": "NVD", "id": "CVE-2002-0891" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-5281" }, { "date": "2002-05-27T00:00:00", "db": "BID", "id": "4842" }, { "date": "2006-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200210-215" }, { "date": "2024-11-20T23:40:07.240000", "db": "NVD", "id": "CVE-2002-0891" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200210-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NetScreen ScreenOS Remote restart vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200210-215" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200210-215" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…