Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.143971 |
Category: | Huawei |
Title: | Huawei Data Communication: Two Vulnerabilities in H323 protocol of Huawei Products (huawei-sa-20171129-01-h323) |
Summary: | There is an out-of-bounds read vulnerability in H323 protocol of Huawei products. |
Description: | Summary: There is an out-of-bounds read vulnerability in H323 protocol of Huawei products. Vulnerability Insight: There is an out-of-bounds read vulnerability in H323 protocol of Huawei products. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. (Vulnerability ID: HWPSIRT-2017-04012)There is a memory leak vulnerability in H323 protocol of Huawei products. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. (Vulnerability ID: HWPSIRT-2017-04013)Huawei has released software updates to fix these vulnerabilities. This advisory is available in the linked references. Vulnerability Impact: By exploiting this vulnerability, an attacker can cause process reboot. Affected Software/OS: AR120-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR1200 versions V200R006C10 V200R006C13 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR1200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR150 versions V200R006C10 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR150-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR160 versions V200R006C10 V200R006C12 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR200 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 V200R008C30 AR200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR2200 versions V200R006C10 V200R006C13 V200R006C16PWE V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR2200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR3200 versions V200R006C10 V200R006C11 V200R007C00 V200R007C01 V200R007C02 V200R008C00 V200R008C10 V200R008C20 V200R008C30 AR3600 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 AR510 versions V200R006C10 V200R006C12 V200R006C13 V200R006C15 V200R006C16 V200R006C17 V200R007C00 V200R008C20 V200R008C30 DP300 versions V500R002C00 IPS Module versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 MAX PRESENCE versions V100R001C00 NGFW Module versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10 NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NetEngine16EX versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 RP200 versions V500R002C00SPC200 V600R006C00 RSE6500 versions V500R002C00 SMC2.0 versions V100R003C10 V100R005C00SPC100 V500R002C00 V500R002C00T V600R006C00 V600R006C00T SRG1300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG2300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG3300 versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 SVN5600 versions V200R003C00 V200R003C10 SVN5800 versions V200R003C00 V200R003C10 SVN5800-C versions V200R003C00 V200R003C10 SeMG9811 versions V300R001C01 Secospace USG6300 versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6500 versions V100R001C10 V100R001C20 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 TE30 versions V100R001C10 V500R002C00 V600R006C00 TE40 versions V500R002C00 V600R006C00 TE50 versions V500R002C00 V600R006C00 TE60 versions V100R001C01 V100R001C10 V500R002C00 V600R006C00 TP3106 versions V100R002C00 TP3206 versions V100R002C00 USG9500 versions V300R001C01 V300R001C20 V500R001C30 V500R001C50 ViewPoint 9030 versions V100R011C02 V100R011C03 Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-15331 Common Vulnerability Exposure (CVE) ID: CVE-2017-15332 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |