TUCoPS :: Network Appliances :: bt755.txt

NetScreen ScreenOS 4.0.3r2 DOS




There is a vulnerability in NetScreen's latest ScreenOS

that allows a malicious user to create a denial of

service attack remotely.



This has only been confirmed with the following

operating systems and NetScreen hardware.



Microsoft Windows 2000 Professional SP1 and SP2

NetScreen 204 and 208



By modifying the TCP Window size in the registry in W2K

a user can cause a NetScreen 20x running ScreenOS

4.0.3r2 to core dump the ASIC and reboot.



This only affects devices that have management services

such as Web, Telnet, or SSH enabled on an interface.



When a user tries to connect to one of the management

ports with the registry settings below the NetScreen

crashes.



\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

New DWORD Value



Tcp1323Opts

HEX

3



TcpWindowSize

Decimal

131400



Papa Love Mambo Research Group

plm at ioerror.org

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH