header-logo
Suggest Exploit
vendor:
NetScreen Firewall
by:
SecurityFocus
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: NetScreen Firewall
Affected Version From: All
Affected Version To: All
Patch Exists: YES
Related CWE: CVE-2002-0206
CPE: o:netscreen:netscreen_firewall
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

NetScreen Firewall Denial of Service

It is possible to cause a denial of service in NetScreen Firewall by requesting an unusually long URL to WebUI listening on default port 80. This will cause the firewall to crash and a restart of the service is required in order to gain normal functionality.

Mitigation:

Restrict access to the WebUI port 80 and limit the length of the URL requests.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2176/info

NetScreen Firewall is a network appliance used to secure against intruders and various types of attacks to a network. NetScreen has a Web administrative Interface (WebUI) used to configure and set the firewall settings.

It is possible to cause a denial of service in NetScreen Firewall. Requesting an unusually long URL to WebUI listening on default port 80, will cause the firewall to crash. A restart of the service is required in order to gain normal functionality. 

Once the input URL is longer than 1220 bytes=A3=ACNetScreen firewall= will crash:

$echo -e "GET /`perl -e 'print "A"x1220'` HTTP/1.0\n\n"|nc= netscreen_firewall 80