Описание
NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours.
Ссылки
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:netscreen:screenos:2.8:*:*:*:*:*:*:*
cpe:2.3:a:netscreen:screenos:3.0:*:*:*:*:*:*:*
cpe:2.3:a:netscreen:screenos:3.1:*:*:*:*:*:*:*
cpe:2.3:a:netscreen:screenos:4.0:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00535
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours.
EPSS
Процентиль: 66%
0.00535
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other