Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.143987 |
Category: | Huawei |
Title: | Huawei Data Communication: Multiple Vulnerabilities in Some Huawei Products (huawei-sa-20171215-01-buffer) |
Summary: | There are two buffer overflow vulnerabilities in some Huawei products. |
Description: | Summary: There are two buffer overflow vulnerabilities in some Huawei products. Vulnerability Insight: There are two buffer overflow vulnerabilities in some Huawei products. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal. (Vulnerability ID: HWPSIRT-2017-04098 and HWPSIRT-2017-04100)The two vulnerabilities have been assigned two Common Vulnerabilities and Exposures (CVE) IDs: CVE-2017-17295 and CVE-2017-17297.There is a memory leak vulnerability in some Huawei products. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal. (Vulnerability ID: HWPSIRT-2017-04099)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17296.Huawei has released software updates to fix these vulnerabilities. This advisory is available in the linked references. Vulnerability Impact: Successful exploit may cause services abnormal. Affected Software/OS: AR120-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR1200 versions V200R006C10 V200R006C13 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR1200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR150 versions V200R006C10 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR150-S versions V200R006C10SPC300 V200R007C00 V200R008C20 V200R008C30 AR160 versions V200R006C10 V200R006C12 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR200 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 V200R008C30 AR200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR2200 versions V200R006C10 V200R006C13 V200R006C16PWE V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30 AR2200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 AR3200 versions V200R006C10 V200R006C11 V200R007C00 V200R007C01 V200R007C02 V200R008C00 V200R008C10 V200R008C20 V200R008C30 AR3600 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 AR510 versions V200R006C10 V200R006C12 V200R006C13 V200R006C15 V200R006C16 V200R006C17 V200R007C00SPC180T V200R008C20 V200R008C30 DP300 versions V500R002C00 IPS Module versions V100R001C10SPC200 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 NGFW Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10 NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6800 versions V500R001C50 NetEngine16EX versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 RP200 versions V500R002C00SPC200 V600R006C00 RSE6500 versions V500R002C00 SRG1300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG2300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30 SRG3300 versions V200R006C10 V200R007C00 V200R008C20 V200R008C30 SVN5600 versions V200R003C00SPC100 V200R003C10 SVN5800 versions V200R003C10 SVN5800-C versions V200R003C00SPC100 V200R003C10 SeMG9811 versions V300R001C01SPC500 Secospace USG6300 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6500 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6600 versions V100R001C00SPC200 V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00 TE40 versions V500R002C00SPC600 V600R006C00 TE50 versions V500R002C00SPC600 V600R006C00 TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00 TP3106 versions V100R002C00 TP3206 versions V100R002C00 V100R002C10 USG9500 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 USG9520 versions V300R001C01SPC500 V300R001C20SPC200 USG9560 versions V300R001C01SPC500 V300R001C20SPC200 USG9580 versions V300R001C01SPC500 V300R001C20SPC200 ViewPoint 9030 versions V100R011C02SPC100 V100R011C03B012SP15 eSpace U1981 versions V200R003C20SPC900 V200R003C30SPC200 Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-17295 Common Vulnerability Exposure (CVE) ID: CVE-2017-17296 Common Vulnerability Exposure (CVE) ID: CVE-2017-17297 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |