Lucene search

K
cve[email protected]CVE-2004-1446
HistoryFeb 13, 2005 - 5:00 a.m.

CVE-2004-1446

2005-02-1305:00:00
web.nvd.nist.gov
27
cve-2004-1446
vulnerability
juniper
netscreen firewall
denial of service
ssh
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%

Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.

Affected configurations

NVD
Node
junipernetscreen_screenosMatch1.7
OR
junipernetscreen_screenosMatch1.64
OR
junipernetscreen_screenosMatch1.66
OR
junipernetscreen_screenosMatch1.66_r2
OR
junipernetscreen_screenosMatch1.73_r1
OR
junipernetscreen_screenosMatch1.73_r2
OR
junipernetscreen_screenosMatch2.0.1_r8
OR
junipernetscreen_screenosMatch2.1
OR
junipernetscreen_screenosMatch2.1_r6
OR
junipernetscreen_screenosMatch2.1_r7
OR
junipernetscreen_screenosMatch2.5
OR
junipernetscreen_screenosMatch2.5r1
OR
junipernetscreen_screenosMatch2.5r2
OR
junipernetscreen_screenosMatch2.5r6
OR
junipernetscreen_screenosMatch2.6.0
OR
junipernetscreen_screenosMatch2.6.1
OR
junipernetscreen_screenosMatch2.6.1r1
OR
junipernetscreen_screenosMatch2.6.1r2
OR
junipernetscreen_screenosMatch2.6.1r3
OR
junipernetscreen_screenosMatch2.6.1r4
OR
junipernetscreen_screenosMatch2.6.1r5
OR
junipernetscreen_screenosMatch2.6.1r6
OR
junipernetscreen_screenosMatch2.6.1r7
OR
junipernetscreen_screenosMatch2.6.1r8
OR
junipernetscreen_screenosMatch2.6.1r9
OR
junipernetscreen_screenosMatch2.6.1r10
OR
junipernetscreen_screenosMatch2.6.1r11
OR
junipernetscreen_screenosMatch2.6.1r12
OR
junipernetscreen_screenosMatch2.7.1
OR
junipernetscreen_screenosMatch2.7.1r1
OR
junipernetscreen_screenosMatch2.7.1r2
OR
junipernetscreen_screenosMatch2.7.1r3
OR
junipernetscreen_screenosMatch2.8
OR
junipernetscreen_screenosMatch2.8_r1
OR
junipernetscreen_screenosMatch2.10_r3
OR
junipernetscreen_screenosMatch2.10_r4
OR
junipernetscreen_screenosMatch3.0.0
OR
junipernetscreen_screenosMatch3.0.0r1
OR
junipernetscreen_screenosMatch3.0.0r2
OR
junipernetscreen_screenosMatch3.0.0r3
OR
junipernetscreen_screenosMatch3.0.0r4
OR
junipernetscreen_screenosMatch3.0.1
OR
junipernetscreen_screenosMatch3.0.1r1
OR
junipernetscreen_screenosMatch3.0.1r2
OR
junipernetscreen_screenosMatch3.0.1r3
OR
junipernetscreen_screenosMatch3.0.1r4
OR
junipernetscreen_screenosMatch3.0.1r5
OR
junipernetscreen_screenosMatch3.0.1r6
OR
junipernetscreen_screenosMatch3.0.1r7
OR
junipernetscreen_screenosMatch3.0.2
OR
junipernetscreen_screenosMatch3.0.3
OR
junipernetscreen_screenosMatch3.0.3_r1.1
OR
junipernetscreen_screenosMatch3.0.3r1
OR
junipernetscreen_screenosMatch3.0.3r2
OR
junipernetscreen_screenosMatch3.0.3r3
OR
junipernetscreen_screenosMatch3.0.3r4
OR
junipernetscreen_screenosMatch3.0.3r5
OR
junipernetscreen_screenosMatch3.0.3r6
OR
junipernetscreen_screenosMatch3.0.3r7
OR
junipernetscreen_screenosMatch3.0.3r8
OR
junipernetscreen_screenosMatch3.1.0
OR
junipernetscreen_screenosMatch3.1.0r1
OR
junipernetscreen_screenosMatch3.1.0r2
OR
junipernetscreen_screenosMatch3.1.0r3
OR
junipernetscreen_screenosMatch3.1.0r4
OR
junipernetscreen_screenosMatch3.1.0r5
OR
junipernetscreen_screenosMatch3.1.0r6
OR
junipernetscreen_screenosMatch3.1.0r7
OR
junipernetscreen_screenosMatch3.1.0r8
OR
junipernetscreen_screenosMatch3.1.0r9
OR
junipernetscreen_screenosMatch3.1.0r10
OR
junipernetscreen_screenosMatch3.1.0r11
OR
junipernetscreen_screenosMatch3.1.0r12
OR
junipernetscreen_screenosMatch3.1.1_r2
OR
junipernetscreen_screenosMatch4.0.0
OR
junipernetscreen_screenosMatch4.0.0dial
OR
junipernetscreen_screenosMatch4.0.0r1
OR
junipernetscreen_screenosMatch4.0.0r2
OR
junipernetscreen_screenosMatch4.0.0r3
OR
junipernetscreen_screenosMatch4.0.0r4
OR
junipernetscreen_screenosMatch4.0.0r5
OR
junipernetscreen_screenosMatch4.0.0r6
OR
junipernetscreen_screenosMatch4.0.0r7
OR
junipernetscreen_screenosMatch4.0.0r8
OR
junipernetscreen_screenosMatch4.0.0r9
OR
junipernetscreen_screenosMatch4.0.0r10
OR
junipernetscreen_screenosMatch4.0.0r11
OR
junipernetscreen_screenosMatch4.0.0r12
OR
junipernetscreen_screenosMatch4.0.1
OR
junipernetscreen_screenosMatch4.0.1r1
OR
junipernetscreen_screenosMatch4.0.1r2
OR
junipernetscreen_screenosMatch4.0.1r3
OR
junipernetscreen_screenosMatch4.0.1r4
OR
junipernetscreen_screenosMatch4.0.1r5
OR
junipernetscreen_screenosMatch4.0.1r6
OR
junipernetscreen_screenosMatch4.0.1r7
OR
junipernetscreen_screenosMatch4.0.1r8
OR
junipernetscreen_screenosMatch4.0.1r9
OR
junipernetscreen_screenosMatch4.0.1r10
OR
junipernetscreen_screenosMatch4.0.2
OR
junipernetscreen_screenosMatch4.0.3
OR
junipernetscreen_screenosMatch4.0.3r1
OR
junipernetscreen_screenosMatch4.0.3r2
OR
junipernetscreen_screenosMatch4.0.3r3
OR
junipernetscreen_screenosMatch4.0.3r4
OR
junipernetscreen_screenosMatch5.0.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%

Related for CVE-2004-1446