NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours.
Max CVSS
5.0
EPSS Score
0.87%
Published
2002-12-31
Updated
2017-07-29
NetScreen ScreenOS before 4.0.1 allows remote attackers to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests.
Max CVSS
4.3
EPSS Score
0.48%
Published
2002-12-31
Updated
2008-09-05
2 vulnerabilities found