Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
Link | Resource |
---|---|
http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/14595 | Exploit |
http://secunia.com/advisories/16474/ | Vendor Advisory |
http://securitytracker.com/id?1014728 | |
http://marc.info/?l=bugtraq&m=112438068426034&w=2 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2005-08-22 21:00
Updated : 2016-10-17 20:29
NVD link : CVE-2005-2640
Mitre link : CVE-2005-2640
JSON object : View
CWE
Products Affected
juniper
- netscreen-idp_100
- netscreen-idp_10
- netscreen-idp_1000
- netscreen_screenos
- netscreen-5gt
- netscreen-idp
- netscreen-idp_500
netscreen
- ns-10
- netscreen-sa_5050_series
- ns-500
- netscreen-sa_5000_series
- ns-204
- ns-50ns25
- ns-100
- netscreen-sa_5020_series
neoteris
- instant_virtual_extranet