|
Vulnerability NetScreen Affected ScreenOS release 1.64, 1.66, 2.01, and 2.5 Description Following is based on a Netscreen List notice. An issue has been discovered (bug ID 8166) in all current versions of ScreenOS software (ScreenOS release 1.64, 1.66, 2.01, and 2.5) for NetScreen-10 and NetScreen-100 systems. The condition allows traffic that should be blocked by the policy configuration, under certain circumstances, to reach the DMZ network. Security for the trusted network is not affected; the vulnerability does not allow "denied" traffic to reach the trusted network. It appears that there is no way to exploit this vulnerability to execute arbitrary commands on the device. The condition exists in all modes of operation on the NetScreen-10 and NetScreen-100 when the DMZ is active for network traffic. The vulnerability manifests itself only after specific traffic patterns have been present for some time. The result is that some packets that are denied by the policy configuration in fact are allowed to pass to the DMZ network. It does not allow all denied packets to pass; only a select few packets may incorrectly be passed. To date no malicious exploitation of the vulnerability has been reported. If you or your customers are using a NetScreen-10 or NetScreen-100 security appliance running a release of version 1.64, 1.66, 2.0, or 2.5 of the device's software then you are affected. If you or your customers have any previous version of the appliance software then you may also be susceptible, but it has not been tested. The severity of the impact will vary based upon the device configuration and environment. Though these conditions are rare in most networks, all affected devices and configurations are advised to assume the vulnerability could affect their network and take action immediately to erase the vulnerability. The vulnerability could be exploited to pass undesirable traffic to the DMZ network, potentially impacting systems on that network. Solution A software fix has been created for this vulnerability and has been made available to all affected customers. The impact is considered medium, and NetScreen strongly encourages all affected users to update their version immediately. All previous released versions of ScreenOS for NetScreen-10 and NetScreen-100 are susceptible to the vulnerability. The problem has been resolved in the following versions of ScreenOS: Version Resolved In 1.6x 1.66r2 for NetScreen-10 and NetScreen-100 2.0 2.01r8 for NetScreen-10 and NetScreen-100 2.5 2.5.0r6 for NetScreen-10 and NetScreen-100