what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

screenos-av-xss-2.txt

screenos-av-xss-2.txt
Posted Jul 2, 2004
Site juniper.net

Sending an infected ZIP archive with a filename containing HTML or Javascript may allow for a Cross-site scripting attack to be performed.

tags | advisory, javascript, xss
SHA-256 | e98c2ee1de4d3a879b43ce2ddf5143f9bf2e65e1f9e497e582b0b79f6f497eba

screenos-av-xss-2.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: Juniper NetScreen Advisory 59147
Date: 29 June 2004
Version: 1


Impact:
Possible HTTP cross-site script execution.


Affected Products:
Juniper Networks NetScreen 5GT Firewalls with AV 5.0.0r1 - 5.0.0r7


Unaffected Products:
Juniper Networks NetScreen 5GT Firewalls without AV (all versions)
All other Juniper Networks NetScreen Firewalls (all versions)


Max Risk: Medium


Summary:
The Juniper Networks NetScreen 5GT Firewall has a HTTP cross-site scripting
vulnerability in the antivirus scan engine.


Details:
The antivirus scan engine in the Juniper Networks NetScreen 5GT Firewall is
susceptible to an HTTP cross-site scripting vulnerability.

When a user downloads Internet content using a Web browser, the antivirus scan
engine scans the contents for viruses. If the file is a zip archive, the scan
engine examines the member files within the archive. When a virus is detected,
the user is presented with a virus notification dialog containing the name of
the infected archive member. If an attacker manually crafts a zip archive
containing a virus-infected file with a specially formatted filename, the
notification dialog could present a cross-site scripting vulnerability.


Recommended Actions:
Upgrade to ScreenOS 5.0.0r8 which fixes this issue. Customers unable to
upgrade to 5.0.0r8 at this time can disable HTTP protocol scanning in the Scan
Manager.


Patch Availability:
NetScreen currently has ScreenOS version 5.0.0r8 available for Juniper
Networks NetScreen Firewalls.

How to get ScreenOS:
Customers with a valid product warranty or a support contract may download the
software from the Juniper NetScreen CSO web portal:
http://www.juniper.net/support/

For all other customers, including those with expired support contracts, please
call your regional Juniper NetScreen TAC center at one of the numbers
listed in: http://www.juniper.net/support/nscn_support/tao/contact.html

Select option 2 from the telephone menu and be sure to select the correct
product from the phone tree. Once connected with an engineer state that you
are calling in regards to a Security Advisory and provide the title of this
notice as evidence of your entitlement to the specified release.

As with any new software installation, Juniper customers planning to upgrade
to any version of ScreenOS should carefully read the release notes and other
relevant documentation before beginning any upgrade.

If you wish to verify the validity of this Security Advisory, the public PGP
key can be accessed at:
http://www.juniper.net/support/nscn_support/security/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: NetScreen Security Response Team <security-alert@netscreen.com>

iD8DBQFA4bjFW2Bw6QjqXRcRAqbQAKCDtHWrlbTZb+woQ0sVt2TedHbDEgCfccor
jyMyJLsvlRZMnS9aM7jxdLc=
=ifnI
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close