Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Netscreen_screenos | Juniper | 2.7.1 (including) | 2.7.1 (including) |
Netscreen_screenos | Juniper | 2.7.1r1 (including) | 2.7.1r1 (including) |
Netscreen_screenos | Juniper | 2.7.1r2 (including) | 2.7.1r2 (including) |
Netscreen_screenos | Juniper | 2.7.1r3 (including) | 2.7.1r3 (including) |
Netscreen_screenos | Juniper | 2.10_r3 (including) | 2.10_r3 (including) |
Netscreen_screenos | Juniper | 2.10_r4 (including) | 2.10_r4 (including) |
Netscreen_screenos | Juniper | 3.0.1r1 (including) | 3.0.1r1 (including) |
Netscreen_screenos | Juniper | 3.0.1r2 (including) | 3.0.1r2 (including) |
Netscreen_screenos | Juniper | 3.0.3_r1.1 (including) | 3.0.3_r1.1 (including) |