Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Network Appliances :: nscreen2.htm

NetScreen - bypass access rules



    ScreenOS release 1.64, 1.66, 2.01, and 2.5


    Following is based on a Netscreen List notice.  An issue has  been
    discovered  (bug  ID  8166)  in  all  current versions of ScreenOS
    software  (ScreenOS  release  1.64,  1.66,  2.01,  and  2.5)   for
    NetScreen-10  and  NetScreen-100  systems.   The  condition allows
    traffic that should be blocked by the policy configuration,  under
    certain circumstances,  to reach  the DMZ  network.   Security for
    the trusted network  is not affected;  the vulnerability does  not
    allow "denied" traffic to reach  the trusted network.  It  appears
    that there  is no  way to  exploit this  vulnerability to  execute
    arbitrary commands on the device.

    The condition exists in all modes of operation on the NetScreen-10
    and NetScreen-100 when the DMZ is active for network traffic.  The
    vulnerability  manifests  itself   only  after  specific   traffic
    patterns have been present for some time.  The result is that some
    packets that are  denied by the  policy configuration in  fact are
    allowed to pass to the DMZ network.  It does not allow all  denied
    packets to  pass; only  a select  few packets  may incorrectly  be

    To date no  malicious exploitation of  the vulnerability has  been

    If you or your customers are using a NetScreen-10 or NetScreen-100
    security appliance running a  release of version 1.64,  1.66, 2.0,
    or 2.5 of the device's software then you are affected.  If you  or
    your customers have any previous version of the appliance software
    then you may also be susceptible, but it has not been tested.

    The  severity  of  the  impact  will  vary  based  upon the device
    configuration and environment.   Though these conditions are  rare
    in  most  networks,  all  affected  devices and configurations are
    advised to  assume the  vulnerability could  affect their  network
    and  take  action  immediately  to  erase  the vulnerability.  The
    vulnerability could  be exploited  to pass  undesirable traffic to
    the DMZ network, potentially impacting systems on that network.


    A software  fix has  been created  for this  vulnerability and has
    been made  available to  all affected  customers.   The impact  is
    considered medium, and NetScreen strongly encourages all  affected
    users to update their version immediately.

    All previous  released versions  of ScreenOS  for NetScreen-10 and
    NetScreen-100 are susceptible to  the vulnerability.  The  problem
    has been resolved in the following versions of ScreenOS:

        Version        Resolved In
        1.6x           1.66r2 for NetScreen-10 and NetScreen-100
        2.0            2.01r8 for NetScreen-10 and NetScreen-100
        2.5            2.5.0r6 for NetScreen-10 and NetScreen-100

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH