NetScreen ScreenOS 2.8 up to and including 4.0, when forwarding H.323 or Netmeeting traffic, allows remote malicious users to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netscreen screenos 2.8 |
||
netscreen screenos 3.0 |
||
netscreen screenos 3.1 |
||
netscreen screenos 4.0 |