NetScreen Information for VU#459371

Multiple IPsec implementations do not adequately validate authentication data

Status

Not Affected

Vendor Statement

NetScreen's Global PRO family of network management applications does not use IPSec and is not vulnerable to the issues raised in VU#459371.

NetScreen has determined that ScreenOS, the operating software for NetScreen security devices, is not vulnerable to the issues raised in VU#459371.

The IPSec implementation in the NetScreen Remote family of VPN and security clients has been examined and NetScreen has determined that it is not vulnerable to the issues raised in VU#459371.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.