Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.143987
Category:Huawei
Title:Huawei Data Communication: Multiple Vulnerabilities in Some Huawei Products (huawei-sa-20171215-01-buffer)
Summary:There are two buffer overflow vulnerabilities in some Huawei products.
Description:Summary:
There are two buffer overflow vulnerabilities in some Huawei products.

Vulnerability Insight:
There are two buffer overflow vulnerabilities in some Huawei products. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal. (Vulnerability ID: HWPSIRT-2017-04098 and HWPSIRT-2017-04100)The two vulnerabilities have been assigned two Common Vulnerabilities and Exposures (CVE) IDs: CVE-2017-17295 and CVE-2017-17297.There is a memory leak vulnerability in some Huawei products. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal. (Vulnerability ID: HWPSIRT-2017-04099)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17296.Huawei has released software updates to fix these vulnerabilities. This advisory is available in the linked references.

Vulnerability Impact:
Successful exploit may cause services abnormal.

Affected Software/OS:
AR120-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

AR1200 versions V200R006C10 V200R006C13 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30

AR1200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

AR150 versions V200R006C10 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30

AR150-S versions V200R006C10SPC300 V200R007C00 V200R008C20 V200R008C30

AR160 versions V200R006C10 V200R006C12 V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30

AR200 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20 V200R008C30

AR200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

AR2200 versions V200R006C10 V200R006C13 V200R006C16PWE V200R007C00 V200R007C01 V200R007C02 V200R008C20 V200R008C30

AR2200-S versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

AR3200 versions V200R006C10 V200R006C11 V200R007C00 V200R007C01 V200R007C02 V200R008C00 V200R008C10 V200R008C20 V200R008C30

AR3600 versions V200R006C10 V200R007C00 V200R007C01 V200R008C20

AR510 versions V200R006C10 V200R006C12 V200R006C13 V200R006C15 V200R006C16 V200R006C17 V200R007C00SPC180T V200R008C20 V200R008C30

DP300 versions V500R002C00

IPS Module versions V100R001C10SPC200 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50

NGFW Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10

NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50

NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50

NIP6800 versions V500R001C50

NetEngine16EX versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

RP200 versions V500R002C00SPC200 V600R006C00

RSE6500 versions V500R002C00

SRG1300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30

SRG2300 versions V200R006C10 V200R007C00 V200R007C02 V200R008C20 V200R008C30

SRG3300 versions V200R006C10 V200R007C00 V200R008C20 V200R008C30

SVN5600 versions V200R003C00SPC100 V200R003C10

SVN5800 versions V200R003C10

SVN5800-C versions V200R003C00SPC100 V200R003C10

SeMG9811 versions V300R001C01SPC500

Secospace USG6300 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50

Secospace USG6500 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50

Secospace USG6600 versions V100R001C00SPC200 V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50

TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00

TE40 versions V500R002C00SPC600 V600R006C00

TE50 versions V500R002C00SPC600 V600R006C00

TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00

TP3106 versions V100R002C00

TP3206 versions V100R002C00 V100R002C10

USG9500 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50

USG9520 versions V300R001C01SPC500 V300R001C20SPC200

USG9560 versions V300R001C01SPC500 V300R001C20SPC200

USG9580 versions V300R001C01SPC500 V300R001C20SPC200

ViewPoint 9030 versions V100R011C02SPC100 V100R011C03B012SP15

eSpace U1981 versions V200R003C20SPC900 V200R003C30SPC200

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-17295
Common Vulnerability Exposure (CVE) ID: CVE-2017-17296
Common Vulnerability Exposure (CVE) ID: CVE-2017-17297
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.