All the vulnerabilites related to huawei - s3700
var-201801-0087
Vulnerability from variot
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s3700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s5300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s9700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s6300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s3300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s9300e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s9300e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s9300e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s2300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300e", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "campus series switches", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-5394" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei", "sources": [ { "db": "BID", "id": "69302" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ], "trust": 0.9 }, "cve": "CVE-2014-5394", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-5394", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-05162", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-73335", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2014-5394", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2014-5394", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-05162", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201408-326", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-73335", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "VULHUB", "id": "VHN-73335" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China\u0027s Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server", "sources": [ { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "BID", "id": "69302" }, { "db": "VULHUB", "id": "VHN-73335" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-5394", "trust": 2.8 }, { "db": "BID", "id": "69302", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2014-008459", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201408-326", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-05162", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-73335", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "VULHUB", "id": "VHN-73335" }, { "db": "BID", "id": "69302" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "id": "VAR-201801-0087", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "VULHUB", "id": "VHN-73335" } ], "trust": 1.3045695790909089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" } ] }, "last_update_date": "2023-12-18T13:24:12.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20140820-01-Campus Switch", "trust": 0.8, "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "title": "Huawei Campus Series Switches User Enumeration Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/49234" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-73335" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/69302" }, { "trust": 1.7, "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5394" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "VULHUB", "id": "VHN-73335" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-05162" }, { "db": "VULHUB", "id": "VHN-73335" }, { "db": "BID", "id": "69302" }, { "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "db": "NVD", "id": "CVE-2014-5394" }, { "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-22T00:00:00", "db": "CNVD", "id": "CNVD-2014-05162" }, { "date": "2018-01-08T00:00:00", "db": "VULHUB", "id": "VHN-73335" }, { "date": "2014-08-20T00:00:00", "db": "BID", "id": "69302" }, { "date": "2018-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "date": "2018-01-08T19:29:00.610000", "db": "NVD", "id": "CVE-2014-5394" }, { "date": "2014-08-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-22T00:00:00", "db": "CNVD", "id": "CNVD-2014-05162" }, { "date": "2018-01-29T00:00:00", "db": "VULHUB", "id": "VHN-73335" }, { "date": "2015-03-19T09:24:00", "db": "BID", "id": "69302" }, { "date": "2018-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008459" }, { "date": "2018-01-29T19:03:59.157000", "db": "NVD", "id": "CVE-2014-5394" }, { "date": "2018-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201408-326" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201408-326" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Campus Information disclosure vulnerability in switch products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008459" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201408-326" } ], "trust": 0.6 } }
var-201802-0527
Vulnerability from variot
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0527", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ecns210 td", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r004c10spc101" }, { "model": "ecns210 td", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r004c10spc102" }, { "model": "ecns210 td", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r004c10spc200" }, { "model": "ecns210 td", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r004c10spc221" }, { "model": "ecns210 td", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r004c10spc400" }, { "model": "s9700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s9700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s9700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s9700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s9700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v200r010c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r004c10" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r004c10spc003" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r004c10spc100" }, { "model": "s12700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s1700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s1700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003c02" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c02" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s9700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s3700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s3700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s12700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 v100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r003c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc101", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc102", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc200", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc221", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc400", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-15346" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vulnerability was discovered by Huawei internal testing.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-061" } ], "trust": 0.6 }, "cve": "CVE-2017-15346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-15346", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-38222", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-106159", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-15346", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-15346", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-38222", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201712-061", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-106159", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-15346", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" }, { "db": "VULMON", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" }, { "db": "VULMON", "id": "CVE-2017-15346" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-15346", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2017-012436", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-061", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-38222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-106159", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-15346", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" }, { "db": "VULMON", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "id": "VAR-201802-0527", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" } ], "trust": 1.6031872141095889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" } ] }, "last_update_date": "2023-12-18T12:50:54.517000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20171201-01-xml", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en" }, { "title": "Huawei\u0027s various product XML parser denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/111809" }, { "title": "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76889" }, { "title": "Huawei Security Advisories: Security Advisory - Two DOS Vulnerabilities of XML Parser in Some Huawei Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=2e3897be411afe991825f2d2f5ab3ea5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULMON", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-106159" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.3, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en" }, { "trust": 1.2, "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15346" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15346" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200909-01-mbb-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" }, { "db": "VULMON", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-38222" }, { "db": "VULHUB", "id": "VHN-106159" }, { "db": "VULMON", "id": "CVE-2017-15346" }, { "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "db": "NVD", "id": "CVE-2017-15346" }, { "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38222" }, { "date": "2018-02-15T00:00:00", "db": "VULHUB", "id": "VHN-106159" }, { "date": "2018-02-15T00:00:00", "db": "VULMON", "id": "CVE-2017-15346" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "date": "2018-02-15T16:29:01.047000", "db": "NVD", "id": "CVE-2017-15346" }, { "date": "2017-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38222" }, { "date": "2018-02-24T00:00:00", "db": "VULHUB", "id": "VHN-106159" }, { "date": "2018-02-24T00:00:00", "db": "VULMON", "id": "CVE-2017-15346" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012436" }, { "date": "2018-02-24T21:26:57.047000", "db": "NVD", "id": "CVE-2017-15346" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012436" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-061" } ], "trust": 0.6 } }
var-201306-0209
Vulnerability from variot
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s2700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3300hi", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3900", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5100", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5600", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "ar 18-1x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0130" }, { "model": "ar 18-2x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r1712" }, { "model": "ar 18-3x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0118" }, { "model": "s2000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s3000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1631" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1632" }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28\\/46", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r0311" }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28/46", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r0311" }, { "model": "s8500", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "r1631 and r1632" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5600", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7800", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 1x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 2x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 3x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 19 29 49", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 28 46", "version": "*" }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300hi", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3500", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3900", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5100", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5600", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s7800", "version": null }, { "model": "r1631", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null }, { "model": "r1632", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0311", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0118", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r1712", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0130", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-6570" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Felix Lindner of Recurity Labs GmbH", "sources": [ { "db": "BID", "id": "60712" } ], "trust": 0.3 }, "cve": "CVE-2012-6570", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2012-6570", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-08072", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e44f6a90-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-59851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-6570", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-08072", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-406", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-59851", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. \nAttackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks", "sources": [ { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "BID", "id": "60712" }, { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-59851" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-6570", "trust": 3.6 }, { "db": "BID", "id": "60712", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201306-406", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-08072", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006007", "trust": 0.8 }, { "db": "IVD", "id": "E44F6A90-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-59851", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "id": "VAR-201306-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" } ], "trust": 1.53885397 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" } ] }, "last_update_date": "2023-12-18T13:53:29.193000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120808-03-HTTP-Module", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "title": "Huawei AR Router and Switch HTTP Module Header Field Handling Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34802" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-59851" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6570" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6570" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08072" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-59851" }, { "date": "2013-06-20T00:00:00", "db": "BID", "id": "60712" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "date": "2013-06-20T15:55:00.967000", "db": "NVD", "id": "CVE-2012-6570" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08072" }, { "date": "2013-06-21T00:00:00", "db": "VULHUB", "id": "VHN-59851" }, { "date": "2015-03-19T08:38:00", "db": "BID", "id": "60712" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "date": "2013-06-21T04:00:00", "db": "NVD", "id": "CVE-2012-6570" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-406" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei of AR Heap-based buffer overflow vulnerability in router and switch products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006007" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ], "trust": 0.8 } }
var-201803-1329
Vulnerability from variot
Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1329", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s7700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s7700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c01" }, { "model": "s7700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c01" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s6700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc019t" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c02" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c20" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c01" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c01" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c10" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c01" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00b050" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c01" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c01" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c02" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc009t" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c01" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s1700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c06" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s1700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c10" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c02" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c01" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c03" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c01" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s12700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s1700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r007c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r007c20", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r006c10", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r006c10", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r007c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r006c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r007c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r008c06", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r007c00b050", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r007c00spc009t", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2700 v200r007c00spc019t", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3700 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00b050:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc009t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc019t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-17141" } ] }, "cve": "CVE-2017-17141", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-17141", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2018-07349", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-108134", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-17141", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-17141", "trust": 1.8, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2018-07349", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201712-302", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-108134", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700", "sources": [ { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-17141", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2017-012890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-302", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-07349", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-108134", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "id": "VAR-201803-1329", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" } ], "trust": 1.5932156033333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" } ] }, "last_update_date": "2023-12-18T12:19:01.627000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20171206-01-mpls", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" }, { "title": "Patch of several Huawei product memory leak vulnerabilities (CNVD-2018-07349)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/125245" }, { "title": "Multiple Huawei Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100236" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108134" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17141" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17141" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-07349" }, { "db": "VULHUB", "id": "VHN-108134" }, { "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "db": "NVD", "id": "CVE-2017-17141" }, { "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-10T00:00:00", "db": "CNVD", "id": "CNVD-2018-07349" }, { "date": "2018-03-05T00:00:00", "db": "VULHUB", "id": "VHN-108134" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "date": "2018-03-05T19:29:00.737000", "db": "NVD", "id": "CVE-2017-17141" }, { "date": "2017-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-10T00:00:00", "db": "CNVD", "id": "CNVD-2018-07349" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-108134" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012890" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2017-17141" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-302" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-302" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Resource management vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-302" } ], "trust": 0.6 } }
var-201306-0006
Vulnerability from variot
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003c01spc100" }, { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "acu", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc100" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c01" }, { "model": "ar g3", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002c00spc200" }, { "model": "atn", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "atn", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c01" }, { "model": "cx200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "cx300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r002" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "cx600", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "e200e-b", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e-c", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x1", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e-x2", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "eudemon1000", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon1000e-u", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemon1000e-x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r002" }, { "model": "eudemon100e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r007" }, { "model": "eudemon200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemon300", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon500", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r006c02" }, { "model": "eudemon8000e-x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "ma5200g", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r003" }, { "model": "ma5200g", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r003" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "me60", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r005c00spc600" }, { "model": "ne20", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r005" }, { "model": "ne40", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r005" }, { "model": "ne40e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne5000e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r007" }, { "model": "ne5000e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v800r002" }, { "model": "ne80", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v300r005" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne80e", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v600r003" }, { "model": "nip100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip1000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "nip2100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "nip2200", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "nip5100", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c00" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s2700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s3700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5300hi", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5306", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5306", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s5700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s6300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s6300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s6700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s7700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003" }, { "model": "s9300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006" }, { "model": "svn2000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "svn3000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r002c02spc802b041" }, { "model": "svn5000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "svn5300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r001c01b019" }, { "model": "wlan ac 6605", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "wlan ac 6605", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v200r001c00spc100" }, { "model": "cx600", "scope": null, "trust": 1.2, "vendor": "huawei", "version": null }, { "model": "eudemon 8160e", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemon usg5500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r002" }, { "model": "e200x3", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "h3c ar\\", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2209" }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "e200x7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200 usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon usg9500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "e200 usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon usg5300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001" }, { "model": "ne40e\\/80e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r002" }, { "model": "eudemon 8080e", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "e200e-usg2100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r005c01" }, { "model": "ne40e\\/80e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v600r003" }, { "model": "e200x5", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "ne40e", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v300r005" }, { "model": "ne20e-x6", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v300r005" }, { "model": "eudemon usg9300", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207" }, { "model": "e200e-x3", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x5", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e-x7", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e/usg2100", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r005c01" }, { "model": "e200e/usg2200", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "e200e/usg5100", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "eudemon8080e", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemon8160e", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemonusg5300", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r001" }, { "model": "eudemonusg5500", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r002" }, { "model": "eudemonusg9300", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "eudemonusg9500", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00spc600" }, { "model": "h3c ar", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "ar x9 series r2209" }, { "model": "ne20e-x6", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne40e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r001" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r002" }, { "model": "ne40e/80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v600r003" }, { "model": "ne80e", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v300r003" }, { "model": "s2700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r005" }, { "model": "ne5000e v300r007", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne5000e v800r002", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ma5200g v200r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ma5200g v300r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne40e/80e", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "atn v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "atn v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne40/ne80 v300r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne20e-x6 v600r003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ne20 v200r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "me60", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "cx200/cx300 v100r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v100r003c01spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v200r001c00spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "acu v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "wlan ac v200r001c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6605" }, { "model": "wlan ac v200r001c00spc100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6605" }, { "model": "s9300", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300/s2700/s3 v100r005", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300/s3300/s5300/s3300hi/ v100r006", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300hi/s5300hi/s5306/s630 v200r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r001c01", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ar g3 v200r002c00spc200", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "h3c ar ar series r2209", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=x9" }, { "model": "ar r2207", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "19/29/49\u003c=" }, { "model": "eudemon100e v200r007", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "eudemon200 v200r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "eudemon300\u0026500\u00261000 v200r006c02", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon1000e-u/usg5300 v200r001", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon1000e-x/usg5500 v200r002", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon8080e\u00268160e/usg9300 v100r003c00", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "eudemon8000e-x/usg9500 v200r001c00spc600", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=" }, { "model": "svn5300 v100r001c01b019", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "svn2000\u00265000 series v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "svn3000 v100r002c02spc802b041", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nip100/200/1000 v100r001", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nip2100\u00262200\u00265100 v100r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "quidway series", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "quidway series", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "me60 v600r002c07", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r003c00spc900", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar r2207", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "19/29/49" }, { "model": "me60 v600r005c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r005c00spc900", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cx600 v600r003c00spca00", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ar r2209", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "19/29/49" } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r002", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2209", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r002", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-4960" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roberto Paleari and Ivan Speziale from Emaze Networks", "sources": [ { "db": "BID", "id": "56510" }, { "db": "CNNVD", "id": "CNNVD-201211-280" } ], "trust": 0.9 }, "cve": "CVE-2012-4960", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT DEFINED", "baseScore": 6.5, "collateralDamagePotential": "LOW-MEDIUM", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 5.1, "exploitability": "FUNCTIONAL", "exploitabilityScore": 8.0, "id": "CVE-2012-4960", "impactScore": 6.4, "integrityImpact": "PARTIAL", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "MEDIUM", "trust": 0.8, "userInterationRequired": null, "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2012-4960", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2013-08074", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-58241", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-4960", "trust": 2.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-08074", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201306-403", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-58241", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice", "sources": [ { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CERT/CC", "id": "VU#948096" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "BID", "id": "56510" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "PACKETSTORM", "id": "118054" } ], "trust": 3.87 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-58241", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-58241" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-4960", "trust": 4.2 }, { "db": "CERT/CC", "id": "VU#948096", "trust": 2.7 }, { "db": "BID", "id": "56510", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU90202792", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006004", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "118054", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-08074", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2012-6517", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201211-280", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201306-403", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "38020", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-58241", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "id": "VAR-201306-0006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" } ], "trust": 2.164663294642857 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" } ] }, "last_update_date": "2023-12-18T13:44:36.277000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120827-01-CX600", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "title": "Huawei multiple product encryption is not a strong vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34800" }, { "title": "Huawei patch for multiple product password encryption vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/25088" }, { "title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-58241" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "NVD", "id": "CVE-2012-4960" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/948096" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu90202792/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960" }, { "trust": 0.6, "url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/56510" }, { "trust": 0.4, "url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141" }, { "trust": 0.3, "url": "http://www.huawei.com/" }, { "trust": 0.3, "url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com" } ], "sources": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#948096" }, { "db": "CNVD", "id": "CNVD-2013-08074" }, { "db": "CNVD", "id": "CNVD-2012-6517" }, { "db": "VULHUB", "id": "VHN-58241" }, { "db": "BID", "id": "56510" }, { "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "db": "PACKETSTORM", "id": "118054" }, { "db": "NVD", "id": "CVE-2012-4960" }, { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-05T00:00:00", "db": "CERT/CC", "id": "VU#948096" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08074" }, { "date": "2012-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-6517" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-58241" }, { "date": "2012-11-13T00:00:00", "db": "BID", "id": "56510" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "date": "2012-11-13T23:22:55", "db": "PACKETSTORM", "id": "118054" }, { "date": "2013-06-20T15:55:00.897000", "db": "NVD", "id": "CVE-2012-4960" }, { "date": "2012-11-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-280" }, { "date": "2013-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-03T00:00:00", "db": "CERT/CC", "id": "VU#948096" }, { "date": "2013-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-08074" }, { "date": "2012-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-6517" }, { "date": "2013-08-22T00:00:00", "db": "VULHUB", "id": "VHN-58241" }, { "date": "2015-03-19T08:28:00", "db": "BID", "id": "56510" }, { "date": "2013-08-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006004" }, { "date": "2013-08-22T03:59:17.713000", "db": "NVD", "id": "CVE-2012-4960" }, { "date": "2012-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-280" }, { "date": "2021-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei networking equipment weak password cipher", "sources": [ { "db": "CERT/CC", "id": "VU#948096" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-280" }, { "db": "CNNVD", "id": "CNNVD-201306-403" } ], "trust": 1.2 } }
var-201306-0208
Vulnerability from variot
Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0208", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s3300", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3300hi", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3900", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5100", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5600", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "ar 18-1x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0130" }, { "model": "ar 18-2x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r1712" }, { "model": "s2000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s2700", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s3000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1631" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1632" }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28\\/46", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r0311" }, { "model": "ar 18-3x", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r0118" }, { "model": "ar 18-2x", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r0118" }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28/46", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r0311" }, { "model": "s8500", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "r1631 and r1632" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5600", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7800", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s7800", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s5600", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s5100", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3900", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3500", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3000", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s2000", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar49", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar46", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar29", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar28", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar19", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-3x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-2x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-1x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 1x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 2x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 3x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 19 29 49", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 28 46", "version": "*" }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300hi", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3500", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3900", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5100", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5600", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s7800", "version": null }, { "model": "r1631", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null }, { "model": "r1632", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null } ], "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "BID", "id": "60708" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0311", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r1712", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0118", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0130", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-6569" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Felix Lindner of Recurity Labs GmbH", "sources": [ { "db": "BID", "id": "60708" } ], "trust": 0.3 }, "cve": "CVE-2012-6569", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2012-6569", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2013-08073", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "e42fb632-2352-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-59850", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-6569", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-08073", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-405", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-59850", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "VULHUB", "id": "VHN-59850" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. Huawei AR routers and Huawei S series switches are network devices of Huawei products. \nAttackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks", "sources": [ { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "BID", "id": "60708" }, { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-59850" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-6569", "trust": 3.6 }, { "db": "BID", "id": "60708", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201306-405", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-08073", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006006", "trust": 0.8 }, { "db": "IVD", "id": "E42FB632-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-59850", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "VULHUB", "id": "VHN-59850" }, { "db": "BID", "id": "60708" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "id": "VAR-201306-0208", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "VULHUB", "id": "VHN-59850" } ], "trust": 1.53885397 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" } ] }, "last_update_date": "2023-12-18T12:21:41.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120808-02-HTTP-Module", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" }, { "title": "Huawei AR Router and Switch HTTP Module Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34801" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-59850" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6569" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6569" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "VULHUB", "id": "VHN-59850" }, { "db": "BID", "id": "60708" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08073" }, { "db": "VULHUB", "id": "VHN-59850" }, { "db": "BID", "id": "60708" }, { "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "db": "NVD", "id": "CVE-2012-6569" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08073" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-59850" }, { "date": "2012-08-04T00:00:00", "db": "BID", "id": "60708" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "date": "2013-06-20T15:55:00.950000", "db": "NVD", "id": "CVE-2012-6569" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08073" }, { "date": "2013-06-21T00:00:00", "db": "VULHUB", "id": "VHN-59850" }, { "date": "2012-08-04T00:00:00", "db": "BID", "id": "60708" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006006" }, { "date": "2013-06-21T04:00:00", "db": "NVD", "id": "CVE-2012-6569" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-405" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-405" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei of AR Stack-based buffer overflow vulnerability in router and switch products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006006" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "e42fb632-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201306-405" } ], "trust": 0.8 } }
var-201504-0247
Vulnerability from variot
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. HP Service Manager Software versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2015-2808
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499
RESOLUTION
HPE has made the following mitigation information available to resolve the vulnerability for the impacted versions of HPE Service Manager: https://softw aresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document /KM01566352
For versions 9.30, 9.31, 9.32, 9.33, 9.34 please:
Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5
SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143332
SM 9.35 HP Itanium Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143206
SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143388
SM 9.35 Linux Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143530
SM 9.35 Solaris Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143276
SM 9.35 Windows Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143589
SM 9.34.P5 package, AIX Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310304
HP Itanium Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02311066
Linux Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310566
Solaris Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02311656
Windows Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310486
For version 9.35 please:
Upgrade to SM 9.35.P4
SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143332
SM 9.35 HP Itanium Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143206
SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143388
SM 9.35 Linux Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143530
SM 9.35 Solaris Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143276
SM 9.35 Windows Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143589
For version 9.40 please:
Upgrade to SM 9.41.P3
SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX
https://softwaresupport.hpe.com/km/KM02236813
Service Manager 9.41.3016 p3 - Server for HP-UX/IA
https://softwaresupport.hpe.com/km/KM02236897
Service Manager 9.41.3016 p3 - Server for Linux
https://softwaresupport.hpe.com/km/KM02236827
Service Manager 9.41.3016 p3 - Server for Solaris
https://softwaresupport.hpe.com/km/KM02236843
Service Manager 9.41.3016 p3 - Server for Windows
https://softwaresupport.hpe.com/km/KM02236929
HISTORY Version:1 (rev.1) - 1 July 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773004
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04773004 Version: 1
HPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification, Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-08-25 Last Updated: 2015-08-25
Potential Security Impact: Remote unauthorized modification, disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Integration Adaptor.
- The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification.
- The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information.
References:
CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102214
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Integration Adaptor v9.12.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following mitigation information available to resolve the vulnerability for the impacted versions of HP Integration Adaptor.
Please consult HP Software Support Online (SSO):
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face
tsearch/document/KM01763510?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE
HISTORY Version:1 (rev.1) - 25 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Customers unable to apply the update should contact HPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1230-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1230.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 =====================================================================
- Summary:
Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
- Description:
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748)
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601)
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808)
Note: With this update, OpenJDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000)
Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749)
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625)
All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVpljRXlSAg2UNWIIRAl93AJ0bTWDExJ3gT6Vf3jj7gLWm1931JQCfSHwy geoA6gBwA56Ep9ZcHnUCxAU= =qQgk -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0247", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "communications application session controller", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "3.9.0" }, { "model": "sparc enterprise m5000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "s5720ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c03" }, { "model": "s5720hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "s5700s-li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "satellite", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.6" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "oceanstor cse", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "satellite", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.9.0" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s5800t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s2600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "10.1" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "10.2" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "10.1.1" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "3.0.0" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.2.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "manager", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.7" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "policy center", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c10" }, { "model": "sparc enterprise m3000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "communications policy management", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "9.9.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "10.2.1" }, { "model": "oceanstor replicationdirector", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "sparc enterprise m5000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "sparc enterprise m9000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.7.0" }, { "model": "oceanstor 18800f", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "cognos metrics manager", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "10.2.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "oceanstor 18500", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "15.04" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s2750", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c02" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "oceanstor 9000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s6800t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "3.2.11" }, { "model": "quidway s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "communications application session controller", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "3.0.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "integrated lights out manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "4.0.4" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "e6000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c04" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.1.0" }, { "model": "sparc enterprise m9000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.1" }, { "model": "sparc enterprise m4000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "sparc enterprise m8000", "scope": "lt", "trust": 1.0, "vendor": "fujitsu", "version": "xcp_1121" }, { "model": "e9000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s5500t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor s5600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "integrated lights out manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "4.0.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "smc2.0", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r002c01" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "oceanstor vis6600t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "s5710ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "oceanstor 18800", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "ultravr", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "sparc enterprise m3000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "policy center", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "sparc enterprise m4000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "sparc enterprise m8000", "scope": "gte", "trust": 1.0, "vendor": "fujitsu", "version": "xcp" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "oceanstor hvs85t", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "te60", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2015-2808" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.0.4", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.2.11", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.9.0", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.9.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-2808" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "137746" }, { "db": "PACKETSTORM", "id": "133337" }, { "db": "PACKETSTORM", "id": "132593" }, { "db": "PACKETSTORM", "id": "136248" } ], "trust": 0.4 }, "cve": "CVE-2015-2808", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-80769", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-2808", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-80769", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. \nHP Service Manager Software versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2015-2808\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\n https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI\nd=emr_na-c01345499\n\nRESOLUTION\n\nHPE has made the following mitigation information available to resolve the\nvulnerability for the impacted versions of HPE Service Manager: https://softw\naresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document\n/KM01566352\n\nFor versions 9.30, 9.31, 9.32, 9.33, 9.34 please:\n\nUpgrade to SM 9.35.P4 (recommended) or SM 9.34.P5\n\nSM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143332\n\nSM 9.35 HP Itanium Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143206\n\nSM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143388\n\nSM 9.35 Linux Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143530\n\nSM 9.35 Solaris Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143276\n\nSM 9.35 Windows Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143589\n\nSM 9.34.P5 package, AIX Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310304\n\nHP Itanium Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02311066\n\nLinux Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310566\n\nSolaris Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02311656\n\nWindows Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310486\n\nFor version 9.35 please:\n\nUpgrade to SM 9.35.P4\n\nSM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143332\n\nSM 9.35 HP Itanium Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143206\n\nSM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143388\n\nSM 9.35 Linux Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143530\n\nSM 9.35 Solaris Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143276\n\nSM 9.35 Windows Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143589\n\nFor version 9.40 please:\n\nUpgrade to SM 9.41.P3\n\nSM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX\n\nhttps://softwaresupport.hpe.com/km/KM02236813\n\nService Manager 9.41.3016 p3 - Server for HP-UX/IA\n\nhttps://softwaresupport.hpe.com/km/KM02236897\n\nService Manager 9.41.3016 p3 - Server for Linux\n\nhttps://softwaresupport.hpe.com/km/KM02236827\n\nService Manager 9.41.3016 p3 - Server for Solaris\n\nhttps://softwaresupport.hpe.com/km/KM02236843\n\nService Manager 9.41.3016 p3 - Server for Windows\n\nhttps://softwaresupport.hpe.com/km/KM02236929\n\nHISTORY\nVersion:1 (rev.1) - 1 July 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04773004\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04773004\nVersion: 1\n\nHPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification,\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-08-25\nLast Updated: 2015-08-25\n\nPotential Security Impact: Remote unauthorized modification, disclosure of\ninformation\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in HP Integration\nAdaptor. \n\n - The TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as \"Logjam\" could be exploited remotely to\nallow unauthorized modification. \n - The RC4 stream cipher vulnerability in SSL/TLS known as \"Bar Mitzvah\"\ncould be exploited remotely to allow disclosure of information. \n\nReferences:\n\nCVE-2015-4000 - \"Logjam\"\nCVE-2015-2808 - \"Bar Mitzvah\"\nSSRT102214\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Integration Adaptor v9.12. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following mitigation information available to resolve the\nvulnerability for the impacted versions of HP Integration Adaptor. \n\n Please consult HP Software Support Online (SSO):\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face\ntsearch/document/KM01763510?lang=en\u0026cc=us\u0026hpappid=113963_OSP_PRO_HPE\n\nHISTORY\nVersion:1 (rev.1) - 25 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Customers unable to apply the update should contact\nHPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: java-1.7.0-openjdk security update\nAdvisory ID: RHSA-2015:1230-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1230.html\nIssue date: 2015-07-15\nCVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 \n CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 \n CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 \n CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 \n CVE-2015-4749 CVE-2015-4760 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix multiple security issues are\nnow available for Red Hat Enterprise Linux 5. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. Description:\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime\nEnvironment and the OpenJDK 7 Java Software Development Kit. \n\nMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI\ncomponents in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760,\nCVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)\n\nA flaw was found in the way the Libraries component of OpenJDK verified\nOnline Certificate Status Protocol (OCSP) responses. An OCSP response with\nno nextUpdate date specified was incorrectly handled as having unlimited\nvalidity, possibly causing a revoked X.509 certificate to be interpreted as\nvalid. (CVE-2015-4748)\n\nIt was discovered that the JCE component in OpenJDK failed to use constant\ntime comparisons in multiple cases. An attacker could possibly use these\nflaws to disclose sensitive information by measuring the time used to\nperform operations using these non-constant time comparisons. \n(CVE-2015-2601)\n\nA flaw was found in the RC4 encryption algorithm. When using certain keys\nfor RC4 encryption, an attacker could obtain portions of the plain text\nfrom the cipher text without the knowledge of the encryption key. \n(CVE-2015-2808)\n\nNote: With this update, OpenJDK now disables RC4 SSL/TLS cipher suites by\ndefault to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug\n1207101, linked to in the References section, for additional details about\nthis change. \n\nA flaw was found in the way the TLS protocol composed the Diffie-Hellman\n(DH) key exchange. A man-in-the-middle attacker could use this flaw to\nforce the use of weak 512 bit export-grade keys during the key exchange,\nallowing them do decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenJDK to\nreject DH key sizes below 768 bits, which prevents sessions to be\ndowngraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,\nlinked to in the References section, for additional details about this\nchange. \n\nIt was discovered that the JNDI component in OpenJDK did not handle DNS\nresolutions correctly. An attacker able to trigger such DNS errors could\ncause a Java application using JNDI to consume memory and CPU time, and\npossibly block further DNS resolution. (CVE-2015-4749)\n\nMultiple information leak flaws were found in the JMX and 2D components in\nOpenJDK. An untrusted Java application or applet could use this flaw to\nbypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)\n\nA flaw was found in the way the JSSE component in OpenJDK performed X.509\ncertificate identity verification when establishing a TLS/SSL connection to\na host identified by an IP address. In certain cases, the certificate was\naccepted as valid if it was issued for a host name to which the IP address\nresolves rather than for the IP address. (CVE-2015-2625)\n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)\n1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)\n1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)\n1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)\n1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)\n1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)\n1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)\n1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)\n1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)\n1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)\n1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)\n1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-2590\nhttps://access.redhat.com/security/cve/CVE-2015-2601\nhttps://access.redhat.com/security/cve/CVE-2015-2621\nhttps://access.redhat.com/security/cve/CVE-2015-2625\nhttps://access.redhat.com/security/cve/CVE-2015-2628\nhttps://access.redhat.com/security/cve/CVE-2015-2632\nhttps://access.redhat.com/security/cve/CVE-2015-2808\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/cve/CVE-2015-4731\nhttps://access.redhat.com/security/cve/CVE-2015-4732\nhttps://access.redhat.com/security/cve/CVE-2015-4733\nhttps://access.redhat.com/security/cve/CVE-2015-4748\nhttps://access.redhat.com/security/cve/CVE-2015-4749\nhttps://access.redhat.com/security/cve/CVE-2015-4760\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVpljRXlSAg2UNWIIRAl93AJ0bTWDExJ3gT6Vf3jj7gLWm1931JQCfSHwy\ngeoA6gBwA56Ep9ZcHnUCxAU=\n=qQgk\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2015-2808" }, { "db": "VULHUB", "id": "VHN-80769" }, { "db": "PACKETSTORM", "id": "137746" }, { "db": "PACKETSTORM", "id": "133337" }, { "db": "PACKETSTORM", "id": "132593" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132698" } ], "trust": 1.44 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-80769", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-2808", "trust": 1.6 }, { "db": "BID", "id": "91787", "trust": 1.1 }, { "db": "BID", "id": "73684", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032788", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033737", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032734", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033432", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033071", "trust": 1.1 }, { "db": "SECTRACK", "id": "1036222", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032708", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032868", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032990", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033072", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032910", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032858", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032600", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032599", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032707", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033386", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033415", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033431", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033769", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10705", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10727", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10783", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10163", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "133337", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "137746", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "136248", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "132872", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132592", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133330", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133392", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132890", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133336", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132891", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133329", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133391", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135172", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133344", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136773", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133366", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132345", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201503-654", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-80769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132593", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132698", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "PACKETSTORM", "id": "137746" }, { "db": "PACKETSTORM", "id": "133337" }, { "db": "PACKETSTORM", "id": "132593" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132698" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "id": "VAR-201504-0247", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-80769" } ], "trust": 0.6578776233333333 }, "last_update_date": "2024-07-23T20:58:53.769000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.0 }, { "problemtype": "CWE-310", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2015-1230.html" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71888" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71892" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/73684" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/91787" }, { "trust": 1.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04779034" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "trust": 1.1, "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "trust": 1.1, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "trust": 1.1, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773256" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246" }, { "trust": 1.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04708650" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04711380" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05085988" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193347" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05289935" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05336888" }, { "trust": 1.1, "url": "https://kb.juniper.net/jsa10783" }, { "trust": 1.1, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098709" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3316" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3339" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/201512-10" }, { "trust": 1.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04687922" }, { "trust": 1.1, "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-mantin-bar-mitzvah-attack-breaking-ssl-with-13-year-old-rc4-weakness-wp.pdf" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1006.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1007.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1020.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1021.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1091.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1228.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1229.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1241.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1242.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1243.html" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1526.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032599" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032600" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032707" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032708" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032734" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032788" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032858" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032868" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032910" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032990" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033071" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033072" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033386" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033415" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033431" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033432" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033737" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033769" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036222" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2696-1" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2706-1" }, { "trust": 1.0, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705" }, { "trust": 1.0, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10727" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "trust": 1.0, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10163" }, { "trust": 1.0, "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2808" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000" }, { "trust": 0.2, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10727" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10163" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143456209711959\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143629696317098\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143818140118771\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817899717054\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143817021313142\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060576831314\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144069189622016\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104565600964\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144060606031437\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144102017024820\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059660127919\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144059703728085\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144043644216842\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143741441012338\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144104533800819\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=144493176821532\u0026amp;w=2" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02236843" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02236813" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143530" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143589" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143332" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02310486" }, { "trust": 0.1, "url": "https://softw" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02236827" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02310566" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02310304" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143206" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?doci" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143388" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02311066" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02236897" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02143276" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02311656" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/km/km02236929" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4732" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4760" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2628" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2601" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4732" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4760" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2601" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4000" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2632" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2632" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2621" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4733" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4748" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4731" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2625" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2625" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4749" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2590" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4733" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4749" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2590" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4731" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4748" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-2628" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "PACKETSTORM", "id": "137746" }, { "db": "PACKETSTORM", "id": "133337" }, { "db": "PACKETSTORM", "id": "132593" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132698" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-80769" }, { "db": "PACKETSTORM", "id": "137746" }, { "db": "PACKETSTORM", "id": "133337" }, { "db": "PACKETSTORM", "id": "132593" }, { "db": "PACKETSTORM", "id": "136248" }, { "db": "PACKETSTORM", "id": "132698" }, { "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-01T00:00:00", "db": "VULHUB", "id": "VHN-80769" }, { "date": "2016-07-01T17:05:00", "db": "PACKETSTORM", "id": "137746" }, { "date": "2015-08-26T23:41:29", "db": "PACKETSTORM", "id": "133337" }, { "date": "2015-07-08T00:35:28", "db": "PACKETSTORM", "id": "132593" }, { "date": "2016-03-15T13:14:00", "db": "PACKETSTORM", "id": "136248" }, { "date": "2015-07-16T17:45:39", "db": "PACKETSTORM", "id": "132698" }, { "date": "2015-04-01T02:00:35.097000", "db": "NVD", "id": "CVE-2015-2808" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-80769" }, { "date": "2023-09-07T17:15:37.500000", "db": "NVD", "id": "CVE-2015-2808" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "136248" } ], "trust": 0.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP Security Bulletin HPSBGN03627 1", "sources": [ { "db": "PACKETSTORM", "id": "137746" } ], "trust": 0.1 } }
var-201706-0237
Vulnerability from variot
The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s5300ei", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s2300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s2300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s6300ei", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s2700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s2700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s5300ei", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s2700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s5300ei", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s6300ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5720hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s5300ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s6700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s3300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5300hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s5300hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s6300ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5300si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5300si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s6300ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s3300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s3300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s5720hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s6700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5300ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s2750ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5700hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5300hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s6700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc500" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5700ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s5700si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s3700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r006c03" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00spc500" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00spc300" }, { "model": "s5700li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00spc500" }, { "model": "s5300li", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s5300hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s5710hi", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00spc300" }, { "model": "s5300si", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00spc300" }, { "model": "s2350ei", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00spc300" }, { "model": "s12700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2750ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700si", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5710hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5720hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6700ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s12700 v200r005c00spc300", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r006c00spc500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r007c00spc500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi v200r006c00spc500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi v200r007c00spc500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-3913" } ] }, "cve": "CVE-2015-3913", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-3913", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-33208", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-81874", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-3913", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-3913", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-33208", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201706-290", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-81874", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700", "sources": [ { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3913", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2015-007610", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201706-290", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-33208", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-81874", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "id": "VAR-201706-0237", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" } ], "trust": 1.48259088 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" } ] }, "last_update_date": "2023-12-18T12:37:21.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20150506-01-ICMP", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449" }, { "title": "Patches for various Huawei product input verification vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/105678" }, { "title": "Multiple Huawei Fixes for product input validation vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74793" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81874" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3913" }, { "trust": 0.6, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-33208" }, { "db": "VULHUB", "id": "VHN-81874" }, { "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "db": "NVD", "id": "CVE-2015-3913" }, { "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-08T00:00:00", "db": "CNVD", "id": "CNVD-2017-33208" }, { "date": "2017-06-08T00:00:00", "db": "VULHUB", "id": "VHN-81874" }, { "date": "2017-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "date": "2017-06-08T21:29:00.377000", "db": "NVD", "id": "CVE-2015-3913" }, { "date": "2017-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-33208" }, { "date": "2017-06-22T00:00:00", "db": "VULHUB", "id": "VHN-81874" }, { "date": "2017-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007610" }, { "date": "2017-06-22T19:00:17.147000", "db": "NVD", "id": "CVE-2015-3913" }, { "date": "2017-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-290" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-290" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Campus Series switch model IP Service operation disruption in the stack (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007610" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-290" } ], "trust": 0.6 } }
var-201306-0210
Vulnerability from variot
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Conversation. An attacker can exploit this issue to gain unauthorized access to the affected device. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks. Predictable session ID value
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0210", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ar 18-1x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0130" }, { "model": "ar 18-2x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r1712" }, { "model": "ar 18-3x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0118" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1631" }, { "model": "s3300hi", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s7800", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s5100", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s3300", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s3500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s3700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1632" }, { "model": "s5600", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s3900", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r6305" }, { "model": "s2000", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s3000", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s3500", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s3900", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s5100", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "s5600", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "s2300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "r6305" }, { "model": "s3000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "r6305" }, { "model": "ar 28\\/46", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r0311" }, { "model": "s2000", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "r6305" }, { "model": "s2700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "r6305" }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207 \\\\\\\\ k" }, { "model": "ar 28/46", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r0311 \\\\\\\\ k" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7800", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s7800", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s5600", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s5100", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3900", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3500", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s3000", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "s2000", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar49", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar46", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar29", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar28", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar19", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-3x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-2x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "ar18-1x", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 1x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 2x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 3x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 19 29 49", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 28 46", "version": "*" }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300hi", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3500", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3900", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5100", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5600", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s7800", "version": null }, { "model": "r1631", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null }, { "model": "r1632", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null } ], "sources": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "BID", "id": "60713" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0311", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0118", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r1712", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0130", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-6571" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Felix Lindner of Recurity Labs GmbH", "sources": [ { "db": "BID", "id": "60713" } ], "trust": 0.3 }, "cve": "CVE-2012-6571", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2012-6571", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-08071", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e444d314-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-59852", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-6571", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-08071", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-407", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-59852", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "VULHUB", "id": "VHN-59852" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Conversation. \nAn attacker can exploit this issue to gain unauthorized access to the affected device. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks. Predictable session ID value", "sources": [ { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "BID", "id": "60713" }, { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-59852" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-6571", "trust": 3.6 }, { "db": "BID", "id": "60713", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201306-407", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-08071", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006008", "trust": 0.8 }, { "db": "IVD", "id": "E444D314-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-59852", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "VULHUB", "id": "VHN-59852" }, { "db": "BID", "id": "60713" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "id": "VAR-201306-0210", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "VULHUB", "id": "VHN-59852" } ], "trust": 1.53885397 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" } ] }, "last_update_date": "2023-12-18T13:09:31.250000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120808-01-HTTP-Module", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" }, { "title": "Huawei AR router and switch HTTP module session ID predictable vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34803" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-59852" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6571" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6571" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "VULHUB", "id": "VHN-59852" }, { "db": "BID", "id": "60713" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08071" }, { "db": "VULHUB", "id": "VHN-59852" }, { "db": "BID", "id": "60713" }, { "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "db": "NVD", "id": "CVE-2012-6571" }, { "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "IVD", "id": "e444d314-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08071" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-59852" }, { "date": "2012-08-04T00:00:00", "db": "BID", "id": "60713" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "date": "2013-06-20T15:55:00.983000", "db": "NVD", "id": "CVE-2012-6571" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08071" }, { "date": "2013-09-02T00:00:00", "db": "VULHUB", "id": "VHN-59852" }, { "date": "2012-08-04T00:00:00", "db": "BID", "id": "60713" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006008" }, { "date": "2013-09-02T06:29:24.353000", "db": "NVD", "id": "CVE-2012-6571" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-407" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-407" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei of AR Vulnerability to hijack sessions in router and switch products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006008" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-407" } ], "trust": 0.6 } }
var-201802-0546
Vulnerability from variot
XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0546", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ecns210 td", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r004c10spc221" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r004c10spc400" }, { "model": "s7700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r010c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r004c10spc200" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r004c10spc101" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r009c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v100r004c10spc102" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s5700", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c02" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s1700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s12700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r004c10spc100" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c02" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s1700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r009c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r010c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r004c10spc003" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r007c00" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r008c00" }, { "model": "s6700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "ecns210 td", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v100r004c10" }, { "model": "ecns210 td", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s12700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s1700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s3700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s12700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r002c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r003c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 v100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 v100r006c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r007c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r003c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s1700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r005c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r008c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r009c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6700 v200r005c02", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s600-e v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300 v200r010c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc003", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc101", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc102", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc200", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc221", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "ecns210 td v100r004c10spc400", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc101:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc102:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10spc221:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-15333" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei internal tester, The vulnerability was discovered by Huawei internal testing.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-060" } ], "trust": 0.6 }, "cve": "CVE-2017-15333", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-15333", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-38223", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-106145", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-15333", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-15333", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-38223", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201712-060", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-106145", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc", "sources": [ { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-15333", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2017-012479", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-060", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-38223", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-106145", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "id": "VAR-201802-0546", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" } ], "trust": 1.6031872141095889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" } ] }, "last_update_date": "2023-12-18T13:33:59.516000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20171201-01-xml", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en" }, { "title": "Patches for various Huawei product XML parser denial of service vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/111799" }, { "title": "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76888" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-106145" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15333" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15333" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-38223" }, { "db": "VULHUB", "id": "VHN-106145" }, { "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "db": "NVD", "id": "CVE-2017-15333" }, { "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38223" }, { "date": "2018-02-15T00:00:00", "db": "VULHUB", "id": "VHN-106145" }, { "date": "2018-03-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "date": "2018-02-15T16:29:00.423000", "db": "NVD", "id": "CVE-2017-15333" }, { "date": "2017-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38223" }, { "date": "2018-02-27T00:00:00", "db": "VULHUB", "id": "VHN-106145" }, { "date": "2018-03-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012479" }, { "date": "2018-02-27T15:17:47.120000", "db": "NVD", "id": "CVE-2017-15333" }, { "date": "2019-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-060" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012479" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-060" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "859A83C4-3AA0-45EA-87DE-CCE978D73474", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ac6605_firmware:ac6605_v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "CA904391-4350-4C84-A39E-C9CE8DC78C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ac6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1E5AE5-EBB2-4E05-A3C7-E2CA54205FF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:acu_firmware:acu_v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "30C4DFFF-9A41-4351-B608-8CCCFFB80505", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:acu_firmware:acu_v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "C8BB0D86-0EFE-48D8-941E-53F574987CD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:acu:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FE6911-4BC0-48D7-8E38-88BDF8E4B5F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s_series_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "D775B6F0-99F2-4F93-ADE5-9006E511B0C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E21E7C93-95A0-4685-9844-40495011C279", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8C30-4C01-4958-A6B3-03337B78366E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "A0D0E1B7-3843-4E18-88AC-D851E9231728", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "258F4E81-9B8A-4133-868D-8829098443D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "2E3CCFD9-46A6-4A56-9300-DF8E6F35446B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D754D004-C6B3-458A-ADE7-F66CC7F6392E", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "CBE6AAB7-B389-48DF-9732-38FE988DB2D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "BA745187-432A-4BCA-8FE6-0A1F4FDBB010", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "60AE0EC6-91F2-4058-9F1B-906F02828976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "A59BADD8-584B-4E53-8386-4B8ADA947CFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "174812BF-795B-4945-B637-3E0E9CFD247F", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "E6804EC1-E774-43B9-B513-896F53AFCD2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "16289CCE-0803-4AB1-AE98-73F78580C3BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "1F3C5718-DC84-456F-9816-052395BCF3FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "D82C04A8-3884-42E5-BE38-E1AAE842A759", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C42CBC6-ADE7-4B16-835C-D06FA23F47BD", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "5B127953-86A8-495E-8868-7764F8A8C76E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C8E49AF7-A906-4CB2-83E2-D263A7E852B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "4CFA05B8-4462-4D11-8A9F-488AF0287FF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "3A7E8867-76FF-4834-A6FF-08537BD6AE8E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A234C65E-2B24-451E-97D2-43440C072043", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "C3FA00DD-61AE-44CA-B995-7BE5249F8F20", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "89C05EAD-1274-42FE-AEF3-7AD5B0DAF65D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "FB355FCB-9A98-49D4-878A-A6EE5DC8A3AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "B2047FBF-4E62-458C-8AF9-C03ED9D9309E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E05A2C5-3BF8-451C-95D3-71BEFCC08DC6", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "7BBF657B-A249-459F-BE89-FAD3AF4AA791", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C60B2971-FE60-4B4F-AAC1-73B9E932135D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "6A231837-BC55-47DF-BB64-EDD52B9901DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "7062DE16-0EDF-45B3-AF49-150581176FF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4732A3E-C3BC-427D-B0A4-31B2B24A411F", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "F32B3FFA-DD66-47A0-AB26-5CC385D898A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C2E49E77-F8E3-40EA-BD94-5911DC93FEE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "E9B9B68D-C9F2-42AB-8287-0D1744DB0DDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "8FE55995-6CE6-4142-BBCF-D268D0967AE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA033B4D-46F1-43AD-B5A7-9AF96B3DE6A9", "versionEndIncluding": "v200r005c00spc300", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "3712D5B6-0D98-422F-8270-C151A2788984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "EEACD3C6-6D1D-4070-8962-D0CD485AA754", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "0A319D8E-17B1-4E61-B61C-596DCBF86475", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "E721F5DD-8F2D-4A1C-9456-FB6476066661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." }, { "lang": "es", "value": "Huawei AC6605 con software V200R001C00; AC6605 con software V200R002C00; ACU con software V200R001C00; ACU con software V200R002C00; S2300, S3300, S2700, S3700 con software V100R006C05 y versiones anteriores; S5300, S5700, S6300, S6700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores; S7700, S9300, S9300E, S9700 con software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 y versiones anteriores podr\u00edan permitir a atacantes remotos enviar un paquete SSH especial al dispositivo VRP para provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2014-8572", "lastModified": "2024-11-21T02:19:21.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:00.423", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "C306035B-10B2-4BC5-B6DE-194BE343DA8E", "versionEndIncluding": "3.9.0", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3AB62FE-AB1A-4162-8A51-E34EDE33DD85", "versionEndExcluding": "9.9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "911FBD5E-213D-482F-81A9-C3B8CE7D903A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBD2676F-EE9D-4462-ABA5-C11CE726849C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6505AE29-5091-4C72-AF6B-932DEF53A8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EC475C1-A339-4C49-B6BA-A0E4D6FDF5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "38A45A86-3B7E-4245-B717-2A6E868BE6BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24EDBB8B-1AFB-498D-B78C-7BC72B8C1085", "versionEndIncluding": "3.2.11", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3024389-3D4A-4E19-BE42-DAF9EA51D471", "versionEndIncluding": "4.0.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A67A7B7A-998D-4B8C-8831-6E58406565FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "58D3B6FD-B474-4B09-B644-A8634A629280", "vulnerable": true }, { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "F892F1B0-514C-42F7-90AE-12ACDFDC1033", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "2C9E2D37-9F56-49E0-BB28-56FB755CE078", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DBE3B60-DED8-4F47-A60F-410ECB873BAE", "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB54B753-F066-4387-B0C3-43E647A42EBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BBD38A2-1B17-4B28-9FE1-6D62A6337C12", "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1846C0CA-AE13-435F-BF91-EEE0CC311DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5884F45B-F822-46B9-A0DC-6B59A3C3E7E0", "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2EDCD99-9677-45A7-9221-3A6A41917A7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED7A13F-9510-4FA0-96A6-D2D34D49545F", "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4C1EC1-19BE-4E1E-8F56-47A83AD0410D", "versionEndExcluding": "xcp_1121", "versionStartIncluding": "xcp", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A2CEAD6-9F8C-411C-9107-BA858CB8A31B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "075D228F-B3F3-44A0-9C93-510E2EF7BE16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F66D29E-0B7F-45D3-BECC-21952F4A4850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA0AE74D-A6FC-44A1-80D4-CB5039FD31AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "741F1B4C-D77D-416F-B6D9-0359F391D96F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929D8B7A-4535-49EA-9DD6-AB83174337AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE27E-EB13-43E2-A7F4-7973977AD936", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E00020C-C1FB-425B-B285-BCF7450F76B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", "matchCriteriaId": "B196FDFF-8A1D-4E7D-895A-1D09ADACC396", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47CA0343-7F2A-45BE-B7A2-8F91F31C0912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E675B6C-C847-486F-8946-F98E271E1DC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D279CD-1344-4200-B4DF-303739323D19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEC54023-CF84-4095-A3E8-2D6E334768E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5F81B5-BD6E-4B10-8EB9-AE0929E3DCE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E9846D2-4A8C-421E-8FE0-F6091DD2B30E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2453CC3-FDD3-4C42-9D17-C231DA2D1F41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", "matchCriteriaId": "675CCB4F-BB76-45DC-9E6E-3BD279995084", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBD74E7B-DB83-44DF-9A0B-D2EFF346855A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FFC0113-86D7-45B1-975F-B24AF1951C4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E3E931B-BD89-48D1-BE5F-0BDBF78914C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36770F0-2E40-42FF-BD7B-7AE2C84E62A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63E1D8ED-A4EC-46B4-A0C0-8F46262F1D2F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6830C365-357D-41A3-8AA7-3B4854260762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A307235-4B7B-40EE-807A-9C8FFD8DF72C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:*", "matchCriteriaId": "866A8777-DB2A-4915-8DA6-1AF751742354", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "488319BB-6D39-4AA5-85A8-840EF46227F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1F50E5B-8733-43AB-B6CF-66AC7305E2DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC3C090-EB04-4A0D-8644-51002CF2ABF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0988C3-BAE5-4B5A-92FC-9D275B4DE9F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F01C05D-6937-4FAD-A0E1-6168EE1D7CE4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF102265-497A-4766-80C8-323D511B4EAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF102265-497A-4766-80C8-323D511B4EAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A3C463F-2C0B-4269-95ED-A578C01E0F55", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A9F6EB-8B6E-465C-B441-C4861771861E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A3C463F-2C0B-4269-95ED-A578C01E0F55", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A9F6EB-8B6E-465C-B441-C4861771861E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89D69269-4251-4CE9-AD67-4968A917C1E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "89D69269-4251-4CE9-AD67-4968A917C1E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "540F0482-7F5E-4688-B282-97A6576E0A6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "789A2B2D-99B1-4AA5-BB39-65D58D8B59B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9FD39BD-0D24-4C1E-969C-C9509AE8A0D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "409A4E21-B8D8-445F-A9C4-3CDA73189CA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED775342-B93C-4DF9-BC62-B6BE549F1B29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "31FB20E5-4830-411C-AE4B-6B2E180C0972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", "matchCriteriaId": "24C4DC87-DE8C-461F-A555-F6E9A71C1C48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E7ABCB-D0C0-4C18-A7AC-8C1EBD5E4E87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D59F3D-CC4A-4ADD-B83C-5CE3F0546622", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "065508F6-D026-4C99-B6F9-AE25CB1124D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86E35CBD-4488-4E64-BEA2-A2E89A4BB9E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0C6E3C4-5677-49B6-9D35-FAC2E550F311", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7859972-B7B8-4619-AAED-22B6B14852BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1755FB01-C830-4147-B0BF-7D422A7D2181", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DF808C1-3081-4FC7-8661-FBF6A04761B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFC3BE-77A0-4202-9AE0-06D8D67F6539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A960DA7-8B35-43B3-B15F-F3F7E14BF308", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0C6E3C4-5677-49B6-9D35-FAC2E550F311", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7859972-B7B8-4619-AAED-22B6B14852BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1755FB01-C830-4147-B0BF-7D422A7D2181", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DF808C1-3081-4FC7-8661-FBF6A04761B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFC3BE-77A0-4202-9AE0-06D8D67F6539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A960DA7-8B35-43B3-B15F-F3F7E14BF308", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A799E13-49E1-4CFB-BB7D-5E528C7E0FE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7B06975-BD37-452D-9782-B768610D3777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D65BF93A-9246-48CB-8510-F6B0380F48D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "matchCriteriaId": "999117E9-90C8-4E76-90B5-7D364C0B84BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "0A0D7527-BCA2-4CF5-A793-1C01F6570679", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "95CA0A4C-2571-4593-A075-9A6A7EABBB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*", "matchCriteriaId": "16D46E9E-7F34-49C4-B56F-9090157FAD6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*", "matchCriteriaId": "8D6E37DD-6CEA-443A-80C2-79E28C78D7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*", "matchCriteriaId": "BE1A9027-21FC-45E0-98B2-BFB8B5BE484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*", "matchCriteriaId": "EC8620BB-7730-4C8F-8B4B-21389636B3C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*", "matchCriteriaId": "D971D78C-A6F3-438D-A292-54A9A226FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "648D923E-BF31-4DF4-B160-66874A8E45AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "23F3243D-14BB-45F4-BBF6-DD45B8729B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "97449883-5401-42C0-8FF1-6A5BEC7BC829", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B2DDB90-C6A1-4EE5-96F2-F0A33B2F79A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E43C2590-059B-43BE-BFD1-7B0D1020D324", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "379CF92E-AFD1-4744-AC07-6A495548F121", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue." }, { "lang": "es", "value": "El algoritmo RC4, utilizado en el protocolo TLS y el protocolo SSL, no combina correctamente los datos de estados con los datos de claves durante la fase de inicializaci\u00f3n, lo que facilita a atacantes remotos realizar ataques de recuperaci\u00f3n de texto claro contra los bytes iniciales de un flujo mediante la captura de trafico de la red que ocasionalmente depende de claves afectadas por la debilidad de la invariabilidad (Invariance Weakness), y posteriormente utilizar un acercamiento de fuerza bruta que involucra valores LSB, tambi\u00e9n conocido como el problema de \u0027Bar Mitzvah\u0027." } ], "id": "CVE-2015-2808", "lastModified": "2024-11-21T02:28:07.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-01T02:00:35.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3316" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3339" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/73684" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032599" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032600" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032707" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032708" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032734" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032788" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032868" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032910" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032990" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033071" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033072" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033386" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033415" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033431" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033432" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033737" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033769" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036222" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2696-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2706-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf" }, { "source": "cve@mitre.org", "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/73684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2696-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2706-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kb.juniper.net/JSA10783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." }, { "lang": "es", "value": "El m\u00f3dulo HTTP en (1) Branch Intelligent Management System (BIMS) y (2) componentes de gesti\u00f3n web de switches de Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 no comprueba si los datos HTTP son mayores que el valor del campo Content-Length, que permite a los servidores HTTP remotos realizar ataques de desbordamiento de b\u00fafer basado en mont\u00edculo y ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta elaborada." } ], "id": "CVE-2012-6570", "lastModified": "2024-11-21T01:46:24.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.967", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "7D81469B-EC6C-493D-B632-4DF821A1F304", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2C4C7-3438-42B8-8999-C17E45C8CF49", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", "matchCriteriaId": "10CBC93B-5CF6-45BF-A90A-84B7693E27FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", "matchCriteriaId": "AC4803A7-44B2-41BA-814D-151239B92CEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c20:*:*:*:*:*:*:*", "matchCriteriaId": "985C07E4-1E27-4191-9FB8-4714A177479D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "B17A34EF-677D-4264-82FB-F7F582C9F56B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", "matchCriteriaId": "410E8DAA-E961-46E1-96E2-3AC4B40D8359", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "F91DC34F-C000-4E51-A70E-38610D31AE53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "3EA85312-3C8F-4F1F-8138-1A091C453193", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "9888DCAA-118C-4091-8425-8FBEE3AAABC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "AED7DFC5-846F-4F90-91A8-13E9E805C9CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "193FCE7A-C793-446B-9C39-20597FA7BC70", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", "matchCriteriaId": "BC1D26AA-09DF-49DA-930F-A2EAEA486361", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", "matchCriteriaId": "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00b050:*:*:*:*:*:*:*", "matchCriteriaId": "339CF153-DF87-4522-8041-E4F65D67D008", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc009t:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2B901-E5B8-4A6D-BDBD-804CECC27B23", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r007c00spc019t:*:*:*:*:*:*:*", "matchCriteriaId": "DC14AAEC-0E25-4B32-9E12-5565B4BF8E37", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "B6F69BC3-E6C0-4E70-AC13-D79D840579DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "85611E3B-826E-4B8F-884B-C121DE4EECEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "336AA440-AEF4-482B-A037-8976DC38BA1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "228D261C-DB88-4AEE-91D3-772DD28E4CDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "4907FBB8-5157-460D-9240-DD7D610C0FCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*", "matchCriteriaId": "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c01:*:*:*:*:*:*:*", "matchCriteriaId": "F64CA8E2-AF04-42B3-8E26-2EF379703B1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*", "matchCriteriaId": "CB33B908-085C-43C6-B8B7-25BBF3614C9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*", "matchCriteriaId": "5B18ABC1-A970-472A-A8BF-934D1180930E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "matchCriteriaId": "40745A01-E5AC-4207-A34F-D8E7F7231F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "48B5A9B7-A931-4806-8AC7-302C6CA49CF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "5B7B7285-F4C6-415C-A948-D7612750A77D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "4D6DC0AF-017E-41BC-A19D-F9AA055F5224", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "749B68B9-9F62-4E7A-AC86-F4073BA32E18", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "F18D9776-5CE7-4DD3-9119-7FB08A35B955", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*", "matchCriteriaId": "F4979AA8-0D8E-4F37-A7DC-709BE4821D51", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "matchCriteriaId": "898AC16A-8F4E-4709-A3B4-DE74FFB91130", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "8DA5CF67-A58B-4666-B87E-712507233453", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "A9EA93B5-01A5-4506-9B0A-993621E6940E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "65902ABB-3EF2-4C8B-BAC1-84BC585019BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "1D75B012-A57D-4C6D-AB26-51D2ECC02F35", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFF0C0-AA17-4AA1-A418-4759D1A58852", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "D84F05D5-BA7D-485B-91C2-273349335CFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c01:*:*:*:*:*:*:*", "matchCriteriaId": "345DA517-033D-4C94-A7F2-77C047309E2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", "matchCriteriaId": "2377CD30-6F57-46CB-9DD1-E29458A7D928", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r007c01:*:*:*:*:*:*:*", "matchCriteriaId": "D55C2AC7-FF47-4160-B524-E3E6C54612E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r008c06:*:*:*:*:*:*:*", "matchCriteriaId": "C6712B77-1268-4A5A-B383-E51D9D51F108", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "032E5E4D-B1B8-4659-8B62-3DC237234501", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*", "matchCriteriaId": "4FB6ED15-477B-4BB5-AA94-0D7897FBD962", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "06AD9ACA-E0C3-4096-BE50-94E717CDA318", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*", "matchCriteriaId": "325D6523-A07A-48D4-AD44-CF838BD77432", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", "matchCriteriaId": "D78DAB13-32AA-4813-AB0A-0EA870F41183", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", "matchCriteriaId": "38515A04-EC21-40B3-A29C-8D0A5883EA4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "matchCriteriaId": "36AB80F7-1BD2-4169-AC70-708CE84BB15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", "matchCriteriaId": "01A0EC8F-6A8A-487F-A92A-789E3789788F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products." }, { "lang": "es", "value": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 tienen una vulnerabilidad de filtrado de informaci\u00f3n. En algunas condiciones espec\u00edficas, si los atacantes env\u00edan mensajes PING MPLS Service especialmente mal formados a los productos afectados, estos no liberan la memoria al gestionar los paquetes. Por lo tanto, esto resulta en el filtrado de memoria de los productos afectados." } ], "id": "CVE-2017-17141", "lastModified": "2024-11-21T03:17:34.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-05T19:29:00.737", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) en el componente de gesti\u00f3n web en Huawei AR routers y switches S2000, S3000, S3500, S3900, S5100, S5600, S7800, y S8500 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una URI de gran longitud." } ], "id": "CVE-2012-6569", "lastModified": "2024-11-21T01:46:23.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.950", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "C9D7CB90-6F2C-4012-8E57-F3B85F9D09C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "FEFF6D05-BC82-4943-9D79-95CBEDD5CD2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "0B863F3A-38C5-4E36-8E71-713B12EE6889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "02401EA6-28B6-4424-B182-C20CD081FFD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "3EA85312-3C8F-4F1F-8138-1A091C453193", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D9357-D179-4B24-A073-17BA09AEC7E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "22A2763B-2A83-4C0A-BA11-2B22CE834EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "8C328054-3E5C-4122-AD5B-49A71791D7F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "7002CF50-20B6-4CB5-8EDE-8B35C7435D6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c03:*:*:*:*:*:*:*", "matchCriteriaId": "85611E3B-826E-4B8F-884B-C121DE4EECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "021F224A-F28F-4192-883C-8A75898BEA84", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "EB980280-1737-47E2-8524-06C2EB3E3A44", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8239CCD8-B83E-4BC0-9F80-F192CE486A4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1A43BCB4-6D92-408E-A73E-CF87CD346E0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "030E1304-CCFB-4433-A367-0D2A1B574914", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "5B196776-C623-4161-8BFB-3F408DB63253", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "E881F881-A952-4E28-93A5-8EDFF2FC08BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "860D9897-72D7-48BC-AAA8-89EDC787DA36", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FC32DB6F-2C8F-45C7-BF80-9750EDAFE1C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C3B1BE75-73A8-424A-9B4B-1BBF64C34E23", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B43D90EA-9BB1-49AE-9076-939D20217917", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "BDBAD45D-6AFB-4A5B-82E8-ED4D15DBF925", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7A61C07A-A249-4EA4-8B33-604A70707757", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "5BC533FD-445D-4198-9230-46051233EBC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B76A602C-EC5B-48A9-BDF6-07A43BFF925C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1599C015-4E36-4C8E-BE07-351DA50F960B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v100r006c00:*:*:*:*:*:*:*", "matchCriteriaId": "210E88DD-C61B-4E70-B412-ABF4B73F3BC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E89C6C1C-AE55-44DC-A9A0-C6B2A8646AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "EE9C1F25-98EC-43B0-B0C6-6DBFA2CD3A96", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7B019E52-17FB-48D9-A301-B4E1855B0C59", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700si_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "265C8691-8272-4C48-BE25-8B2B51C15888", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", "matchCriteriaId": "24C4DC87-DE8C-461F-A555-F6E9A71C1C48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "73686E67-21C2-45B0-A105-A2AB5B3E7218", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "350FCDA4-19BF-4E63-B7C9-A1159A267EBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "6563866F-D1E3-4B8B-9D08-AA952F610556", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "77512809-D6F1-4F19-8B79-70CC973FC6C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B4C8E2-7928-41FF-ACF7-E2CF28501997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "4F365BF7-A73E-4628-98E7-06A6C819B38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "F6CFB46C-A6E3-49C4-84A9-B682BD2AF13D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "1CBAA8F6-0AE2-4287-A3F1-64198AAF7151", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "3C341CDB-A532-4B87-9DF5-D0576412DC8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED775342-B93C-4DF9-BC62-B6BE549F1B29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5B574-03D0-4111-B4AF-3732012C2E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "22644C5E-1ABF-433B-AD38-13533395F456", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "806F90CD-1EDA-4148-8938-DDC78B3DE82D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "36314640-E462-42EB-9BE6-B4683B9DA7B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "10DD372D-3ED3-4E80-85DB-5E03BF4F38BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "68CEEFD6-7FFD-498A-841F-A4664157033B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "AC040EE3-4CC8-42CC-A03B-89F4061A3B07", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D68F9EF2-A93E-4CE1-9A7C-7097BDAF18C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "F09DBA68-6F2E-42B1-B62C-50ED5317D363", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DC1062F4-6272-4C69-9F52-B2D04BF8B04A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "CA4B9066-4940-4BCF-A11A-65E4D3F9819E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8FBC1C70-C1C0-4CAD-9616-039E80837983", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5710hi_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "59EBEED2-52C2-4F9E-919C-C4C6B3617D68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "3E037F4C-EA5B-4526-9182-F028E580C361", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "6DE63BF3-2EE8-4AB7-91D1-E83D2DFF0F9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "97C17461-23DF-4E9C-9806-102F06D66045", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BFD9B623-1853-4F2B-B89B-1E31B3AC743A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "E849DDBF-80AC-4736-88A2-E6EECCC8CE4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "983B3479-E7EE-49C2-82D5-02B6620B5479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "18E9BB0F-6A34-490E-82EC-ADE12AC3E649", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2B171E0D-91E5-4EC6-9C0F-FAB2BC0A3915", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B338780D-71EB-44A1-A95B-26C240586FAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "EC27F896-EF43-40D4-A436-212E865BF699", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "D2570A5D-2AC0-495C-BF99-2E19A9B8217F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700li_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "D60AF421-5F71-43CC-B852-B16063B26F66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B89917-2B3D-4BA5-8836-ADEECF46E976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "0C15E318-E188-46CD-B7B5-AFDDB12137E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "01A6ECDF-0606-45BD-8574-76508DB88669", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C1C446CC-A622-4E08-9FDE-399EBDB3C3B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "B73AADFE-502E-43B0-BAE2-9E99ACFC5799", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "C5E2F24F-D185-4529-BFA3-E3B6CED7ABED", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "4AB4D0E0-636B-47CC-8A9C-86D2937F59A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "98BD1EFD-29F1-495E-8701-EFF2CC710F4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D8E01D70-2DEC-4A5B-B33E-5665B9200B96", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "D376B21B-5B1C-44F3-A4A3-0650EBC1A0C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FAA30-8F9C-4993-8F24-72D7CFA8EBDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "FC43FCD5-E820-44E9-8C2F-63F252BA4042", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2750ei_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F5C14E76-DE28-44C1-84FC-6A61B1CE77BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2750ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "7770B303-C595-4D00-961B-23BCCCEBC725", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7635D7EE-D274-42C5-A627-E2C77F4753DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "7520E268-DFAC-4CC1-AEC5-08844E95CECE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "5D0B5718-9465-476F-B2FA-FFC6FB08E354", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "13FB139B-C0C2-4BB5-BA60-E1B32030F9E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DC191A39-26C6-4503-9152-A29A2EAAC6BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F368821C-C253-4584-B53C-F6BBA0186433", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A066F4B8-2258-4ED2-A166-02FCA7C9F3A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "DDA38762-CACE-403B-8DE5-42E0306FEB28", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "989CE0D9-95CE-4571-A89F-EE083C63CFB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E4EE71EF-90D8-40C6-9E80-A543ED32E976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8C2BF2B6-915B-4F57-8C75-CD09612985F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CBDBE325-B6F4-475F-B7F8-F3142F730039", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "CAB593E5-D919-436C-A10A-6FA72B69EA55", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "464C5DF2-E6D7-4679-A375-521FD730CA14", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "8D4F46F5-1BD2-444E-84B9-09DC4440B355", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "C5234B43-EA0C-45C9-B188-4D6085F031F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "F8A79318-19CF-4097-9B49-A9BF7CD9E716", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r007c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CAEE3E52-4646-4D35-931B-4739E059732F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." }, { "lang": "es", "value": "En varios modelos de switch de la serie Huawei Campus, la pila IP permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de un mensaje de solicitud ICMP manipulado." } ], "id": "CVE-2015-3913", "lastModified": "2024-11-21T02:30:04.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-08T21:29:00.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/69302 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/97763 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69302 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/97763 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2D1EF10E-F18B-4F3A-AA2B-25003183E19D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "54D5B323-BFB3-4A0A-B1E1-37E4DC4FF984", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "78DA2DC7-63B3-40D7-BEC7-AF81066A2733", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BB3FA8B2-A788-408C-AD24-AE5BA2501139", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8F3D1698-CBF3-4C2C-B581-343FBD8E8831", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300e_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "E5752E4C-4B7D-4139-BCAE-7F52D4A235F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B913A258-48B6-45D0-A37B-2C665DCA735C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "07A44DEA-AB17-48F4-87C1-B3B6088BCD82", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DBAD-B0A9-4A16-AE6A-D3949A1764D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "5D0B5718-9465-476F-B2FA-FFC6FB08E354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "E4EE71EF-90D8-40C6-9E80-A543ED32E976", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "8C2BF2B6-915B-4F57-8C75-CD09612985F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00spc500:*:*:*:*:*:*:*", "matchCriteriaId": "CBDBE325-B6F4-475F-B7F8-F3142F730039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "121BEE57-945E-4368-8AE4-4A823D70D31C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "A802134B-7EC8-4935-878A-4DCD730BCD4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "DEC329F7-D83F-4119-B8CA-CC819EC872CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "4AF84CB7-7EC9-4978-A4F6-FD5746AF1CE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "279D9CE4-AAEF-4EFC-8340-668CFCF47717", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7D5033F0-7E4F-431A-B4EA-E5D5D1FCFE5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "93E7A87E-E2FB-4852-9BE5-164822801822", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "BA5C970C-03B5-4757-B3B8-34CF1DFC3482", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "9D07FB95-7CE7-480A-BF2D-87017EFAE038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "7082EE3F-3174-42C2-B010-5078DC752D67", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "73796844-B30E-4040-AF4E-105AB6BA357F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00spc300:*:*:*:*:*:*:*", "matchCriteriaId": "2CB0108A-2462-45D6-8A82-8681E8167D6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "0B863F3A-38C5-4E36-8E71-713B12EE6889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D9357-D179-4B24-A073-17BA09AEC7E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD2CD071-58E4-4061-8217-990453213470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "3DBB1A49-B169-40F4-B611-C739896A2A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3700_firmware:v100r006c05:*:*:*:*:*:*:*", "matchCriteriaId": "021F224A-F28F-4192-883C-8A75898BEA84", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F84390-E120-406B-967D-B473EB110EA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." }, { "lang": "es", "value": "M\u00faltiples switches Huawei Campus permiten que los atacantes remotos enumeren los nombres de usuario mediante vectores que involucren el uso de SSH por el terminal de mantenimiento." } ], "id": "CVE-2014-5394", "lastModified": "2024-11-21T02:11:58.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-08T19:29:00.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69302" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | ar_18-1x | * | |
huawei | ar_18-2x | * | |
huawei | ar_18-3x | * | |
huawei | ar_19\/29\/49 | * | |
huawei | ar_28\/46 | * | |
huawei | s2000 | r6305 | |
huawei | s2300 | r6305 | |
huawei | s2700 | r6305 | |
huawei | s3000 | r6305 | |
huawei | s3300 | r6305 | |
huawei | s3300hi | r6305 | |
huawei | s3500 | r6305 | |
huawei | s3700 | r6305 | |
huawei | s3900 | r6305 | |
huawei | s5100 | r6305 | |
huawei | s5600 | r6305 | |
huawei | s7800 | r6305 | |
huawei | s8500 | r1631 | |
huawei | s8500 | r1632 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C169428A-DBA2-4AD4-AB2F-9B55F406D5F5", "versionEndIncluding": "r0130", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "matchCriteriaId": "F96CD3E2-2AE8-48B2-9979-84AD3C99933E", "versionEndIncluding": "r1712", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93A0EF1-FDC5-4E7C-A692-C664552913EF", "versionEndIncluding": "r0118", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "matchCriteriaId": "A520A0A9-2BF8-4E32-9194-3307CE52C2AD", "versionEndIncluding": "r0311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "5AF996D4-838E-4295-B8E2-43512DC9BF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "6185A1C4-34B8-4FED-8144-15EA8012CA38", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "49B54F7F-0B13-4ADC-B8F5-72606273528E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5B0CA-8081-4492-8D2A-5FEE778C5E82", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "708E992F-581F-4DA0-A490-BB6E2BA8B598", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "7C8FA59E-F894-441D-8FBA-5D865BD3DFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "945EEE2E-C21E-4E1D-9D91-F5B0A77C7CDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "08E4AE20-F5FB-47DF-817E-DF7871121CA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "394161B5-65DF-4921-AE2B-0959322A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "F02BD40C-8825-46ED-9C99-A4DD5331F04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "47BCCDFB-27DB-439B-965C-525941118C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "matchCriteriaId": "0C3232F7-23AC-4773-A67D-BCA0A886FE3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "matchCriteriaId": "7D4B69FE-DC23-4A78-9D1A-C35EA98CB1FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "matchCriteriaId": "008D26B5-DC98-4592-B592-3728C8A0D6C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." }, { "lang": "es", "value": "El m\u00f3dulo HTTP en el (1) Branch Intelligent Management System (BIMS) y (2) gesti\u00f3n web de componentes para switches Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 usa valores de Session ID predecibles lo que hace m\u00e1s f\u00e1cil a atacantes remotos secuestrar la sesi\u00f3n a trav\u00e9s de ataques de fuerza bruta." } ], "id": "CVE-2012-6571", "lastModified": "2024-11-21T01:46:24.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.983", "references": [ { "source": "cve@mitre.org", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*", "matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9", "versionEndIncluding": "r2207", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*", "matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*", "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*", "matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*", "matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*", "matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*", "matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*", "matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90", "versionEndIncluding": "v100r005c01", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1", "versionEndIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*", "matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26", "versionEndIncluding": "v200r001", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60", "versionEndIncluding": "v200r002", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*", "matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A", "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5", "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5", "versionEndIncluding": "v200r001", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7", "versionEndIncluding": "v200r002", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*", "matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*", "matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70", "versionEndIncluding": "v200r006c02", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0", "versionEndIncluding": "v200r001c00spc600", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478", "versionEndIncluding": "r2209", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*", "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*", "matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*", "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*", "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*", "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*", "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*", "matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*", "matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*", "matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*", "matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*", "matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*", "matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*", "matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*", "matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*", "matchCriteriaId": "94970073-415B-4358-833F-CC220653376D", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*", "matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*", "matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*", "matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*", "matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." }, { "lang": "es", "value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta." } ], "id": "CVE-2012-4960", "lastModified": "2024-11-21T01:43:49.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-20T15:55:00.897", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/948096" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-2808
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:24:38.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSRT102127", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "name": "RHSA-2015:1243", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html" }, { "name": "RHSA-2015:1007", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html" }, { "name": "HPSBGN03367", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "name": "HPSBUX03512", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "RHSA-2015:1006", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256" }, { "tags": [ "x_transferred" ], "url": "https://kb.juniper.net/JSA10783" }, { "name": "1033737", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033737" }, { "name": "SUSE-SU-2015:2192", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "name": "HPSBGN03399", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "1036222", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036222" }, { "tags": [ "x_transferred" ], "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034" }, { "name": "SSRT102129", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "name": "GLSA-201512-10", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "RHSA-2015:1229", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650" }, { "name": "1032600", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032600" }, { "name": "1032910", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032910" }, { "name": "USN-2706-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2706-1" }, { "name": "RHSA-2015:1526", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html" }, { "name": "SSRT102133", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "1032599", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032599" }, { "name": "HPSBMU03401", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "HPSBMU03345", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "name": "1032734", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032734" }, { "name": "IV71892", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347" }, { "name": "1033769", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033769" }, { "name": "1032707", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032707" }, { "name": "openSUSE-SU-2015:1289", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "name": "HPSBGN03372", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "name": "RHSA-2015:1091", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html" }, { "name": "HPSBGN03402", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "name": "IV71888", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888" }, { "name": "RHSA-2015:1228", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html" }, { "name": "HPSBGN03405", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "name": "1032708", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032708" }, { "tags": [ "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "name": "DSA-3316", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3316" }, { "name": "SUSE-SU-2015:2166", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "1033415", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033415" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246" }, { "name": "HPSBGN03366", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709" }, { "name": "HPSBGN03403", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "name": "SSRT102254", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "name": "HPSBGN03407", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "name": "1033432", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033432" }, { "name": "HPSBGN03354", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "name": "SUSE-SU-2015:1138", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "name": "1032858", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032858" }, { "name": "SSRT102073", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922" }, { "name": "1032788", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032788" }, { "name": "USN-2696-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2696-1" }, { "tags": [ "x_transferred" ], "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf" }, { "name": "DSA-3339", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3339" }, { "name": "RHSA-2015:1020", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html" }, { "name": "RHSA-2015:1242", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241" }, { "name": "SUSE-SU-2015:1086", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "name": "1033431", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033431" }, { "tags": [ "x_transferred" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988" }, { "name": "1032868", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032868" }, { "name": "HPSBGN03415", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2015:1319", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "name": "SUSE-SU-2015:1320", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "name": "openSUSE-SU-2015:1288", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "name": "RHSA-2015:1241", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "RHSA-2015:1230", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888" }, { "name": "HPSBGN03338", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "name": "1033386", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033386" }, { "name": "HPSBMU03377", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "name": "1033072", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033072" }, { "name": "SSRT102150", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789" }, { "name": "SUSE-SU-2015:1085", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "tags": [ "x_transferred" ], "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119" }, { "name": "RHSA-2015:1021", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html" }, { "tags": [ "x_transferred" ], "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "name": "SUSE-SU-2015:1073", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935" }, { "name": "SUSE-SU-2015:1161", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "name": "HPSBGN03414", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "name": "73684", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73684" }, { "name": "1032990", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032990" }, { "name": "1033071", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033071" }, { "name": "SUSE-SU-2016:0113", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "tags": [ "x_transferred" ], "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-07T16:46:59.848306", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSRT102127", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "name": "RHSA-2015:1243", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html" }, { "name": "RHSA-2015:1007", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html" }, { "name": "HPSBGN03367", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "name": "HPSBUX03512", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "RHSA-2015:1006", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256" }, { "url": "https://kb.juniper.net/JSA10783" }, { "name": "1033737", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033737" }, { "name": "SUSE-SU-2015:2192", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" }, { "name": "HPSBGN03399", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "1036222", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1036222" }, { "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034" }, { "name": "SSRT102129", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2" }, { "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769" }, { "name": "GLSA-201512-10", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201512-10" }, { "name": "RHSA-2015:1229", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650" }, { "name": "1032600", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032600" }, { "name": "1032910", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032910" }, { "name": "USN-2706-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2706-1" }, { "name": "RHSA-2015:1526", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html" }, { "name": "SSRT102133", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "1032599", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032599" }, { "name": "HPSBMU03401", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2" }, { "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "HPSBMU03345", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2" }, { "name": "1032734", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032734" }, { "name": "IV71892", "tags": [ "vendor-advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347" }, { "name": "1033769", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033769" }, { "name": "1032707", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032707" }, { "name": "openSUSE-SU-2015:1289", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" }, { "name": "HPSBGN03372", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2" }, { "name": "RHSA-2015:1091", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html" }, { "name": "HPSBGN03402", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2" }, { "name": "IV71888", "tags": [ "vendor-advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888" }, { "name": "RHSA-2015:1228", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html" }, { "name": "HPSBGN03405", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2" }, { "name": "1032708", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032708" }, { "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055" }, { "name": "DSA-3316", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2015/dsa-3316" }, { "name": "SUSE-SU-2015:2166", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "1033415", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033415" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246" }, { "name": "HPSBGN03366", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2" }, { "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709" }, { "name": "HPSBGN03403", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2" }, { "name": "SSRT102254", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640" }, { "name": "HPSBGN03407", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2" }, { "name": "1033432", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033432" }, { "name": "HPSBGN03354", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2" }, { "name": "SUSE-SU-2015:1138", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html" }, { "name": "1032858", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032858" }, { "name": "SSRT102073", "tags": [ "vendor-advisory" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922" }, { "name": "1032788", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032788" }, { "name": "USN-2696-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2696-1" }, { "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf" }, { "name": "DSA-3339", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2015/dsa-3339" }, { "name": "RHSA-2015:1020", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html" }, { "name": "RHSA-2015:1242", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241" }, { "name": "SUSE-SU-2015:1086", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" }, { "name": "1033431", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033431" }, { "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988" }, { "name": "1032868", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032868" }, { "name": "HPSBGN03415", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2015:1319", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" }, { "name": "SUSE-SU-2015:1320", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" }, { "name": "openSUSE-SU-2015:1288", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" }, { "name": "RHSA-2015:1241", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "RHSA-2015:1230", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888" }, { "name": "HPSBGN03338", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2" }, { "name": "1033386", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033386" }, { "name": "HPSBMU03377", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "name": "1033072", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033072" }, { "name": "SSRT102150", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789" }, { "name": "SUSE-SU-2015:1085", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html" }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119" }, { "name": "RHSA-2015:1021", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html" }, { "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015" }, { "name": "SUSE-SU-2015:1073", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935" }, { "name": "SUSE-SU-2015:1161", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" }, { "name": "HPSBGN03414", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2" }, { "name": "73684", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/73684" }, { "name": "1032990", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032990" }, { "name": "1033071", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1033071" }, { "name": "SUSE-SU-2016:0113", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" }, { "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2808", "datePublished": "2015-04-01T00:00:00", "dateReserved": "2015-03-31T00:00:00", "dateUpdated": "2024-08-06T05:24:38.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-17141
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700 |
Version: S12700 V200R005C00 Version: V200R006C00 Version: V200R007C00 Version: V200R007C01 Version: V200R007C20 Version: V200R008C00 Version: V200R009C00 Version: S1700 V200R006C10 Version: S2700 V100R006C03 Version: V200R003C00 Version: V200R005C00 Version: V200R006C10 Version: V200R007C00B050 Version: V200R007C00SPC009T Version: V200R007C00SPC019T Version: S3700 V100R006C03 Version: S5700 V200R001C00 Version: V200R001C01 Version: V200R002C00 Version: V200R003C02 Version: V200R005C01 Version: V200R005C02 Version: V200R005C03 Version: S6700 V200R001C00 Version: S7700 V200R001C00 Version: V200R006C01 Version: V200R008C06 Version: S9700 V200R001C00 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:43:59.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "S12700 V200R005C00" }, { "status": "affected", "version": "V200R006C00" }, { "status": "affected", "version": "V200R007C00" }, { "status": "affected", "version": "V200R007C01" }, { "status": "affected", "version": "V200R007C20" }, { "status": "affected", "version": "V200R008C00" }, { "status": "affected", "version": "V200R009C00" }, { "status": "affected", "version": "S1700 V200R006C10" }, { "status": "affected", "version": "S2700 V100R006C03" }, { "status": "affected", "version": "V200R003C00" }, { "status": "affected", "version": "V200R005C00" }, { "status": "affected", "version": "V200R006C10" }, { "status": "affected", "version": "V200R007C00B050" }, { "status": "affected", "version": "V200R007C00SPC009T" }, { "status": "affected", "version": "V200R007C00SPC019T" }, { "status": "affected", "version": "S3700 V100R006C03" }, { "status": "affected", "version": "S5700 V200R001C00" }, { "status": "affected", "version": "V200R001C01" }, { "status": "affected", "version": "V200R002C00" }, { "status": "affected", "version": "V200R003C02" }, { "status": "affected", "version": "V200R005C01" }, { "status": "affected", "version": "V200R005C02" }, { "status": "affected", "version": "V200R005C03" }, { "status": "affected", "version": "S6700 V200R001C00" }, { "status": "affected", "version": "S7700 V200R001C00" }, { "status": "affected", "version": "V200R006C01" }, { "status": "affected", "version": "V200R008C06" }, { "status": "affected", "version": "S9700 V200R001C00" } ] } ], "datePublic": "2017-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products." } ], "problemTypes": [ { "descriptions": [ { "description": "memory leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-05T18:57:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-12-06T00:00:00", "ID": "CVE-2017-17141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "S12700; S1700; S2700; S3700; S5700; S6700; S7700; S9700", "version": { "version_data": [ { "version_value": "S12700 V200R005C00" }, { "version_value": "V200R006C00" }, { "version_value": "V200R007C00" }, { "version_value": "V200R007C01" }, { "version_value": "V200R007C20" }, { "version_value": "V200R008C00" }, { "version_value": "V200R009C00" }, { "version_value": "S1700 V200R006C10" }, { "version_value": "V200R009C00" }, { "version_value": "S2700 V100R006C03" }, { "version_value": "V200R003C00" }, { "version_value": "V200R005C00" }, { "version_value": "V200R006C00" }, { "version_value": "V200R006C10" }, { "version_value": "V200R007C00" }, { "version_value": "V200R007C00B050" }, { "version_value": "V200R007C00SPC009T" }, { "version_value": "V200R007C00SPC019T" }, { "version_value": "V200R008C00" }, { "version_value": "V200R009C00" }, { "version_value": "S3700 V100R006C03" }, { "version_value": "S5700 V200R001C00" }, { "version_value": "V200R001C01" }, { "version_value": "V200R002C00" }, { "version_value": "V200R003C00" }, { "version_value": "V200R003C02" }, { "version_value": "V200R005C00" }, { "version_value": "V200R005C01" }, { "version_value": "V200R005C02" }, { "version_value": "V200R005C03" }, { "version_value": "V200R006C00" }, { "version_value": "V200R007C00" }, { "version_value": "V200R008C00" }, { "version_value": "V200R009C00" }, { "version_value": "S6700 V200R001C00" }, { "version_value": "V200R001C01" }, { "version_value": "V200R002C00" }, { "version_value": "V200R003C00" }, { "version_value": "V200R005C00" }, { "version_value": "V200R005C01" }, { "version_value": "V200R005C02" }, { "version_value": "V200R008C00" }, { "version_value": "V200R009C00" }, { "version_value": "S7700 V200R001C00" }, { "version_value": "V200R001C01" }, { "version_value": "V200R002C00" }, { "version_value": "V200R003C00" }, { "version_value": "V200R005C00" }, { "version_value": "V200R006C00" }, { "version_value": "V200R006C01" }, { "version_value": "V200R007C00" }, { "version_value": "V200R007C01" }, { "version_value": "V200R008C00" }, { "version_value": "V200R008C06" }, { "version_value": "V200R009C00" }, { "version_value": "S9700 V200R001C00" }, { "version_value": "V200R001C01" }, { "version_value": "V200R002C00" }, { "version_value": "V200R003C00" }, { "version_value": "V200R005C00" }, { "version_value": "V200R006C00" }, { "version_value": "V200R007C00" }, { "version_value": "V200R007C01" }, { "version_value": "V200R008C00" }, { "version_value": "V200R009C00" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "memory leak" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-17141", "datePublished": "2018-03-05T19:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-09-17T03:23:15.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4960
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/948096 | third-party-advisory, x_refsource_CERT-VN | |
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:18.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#948096", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#948096", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/948096" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-4960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#948096", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/948096" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-4960", "datePublished": "2013-06-20T15:00:00", "dateReserved": "2012-09-17T00:00:00", "dateUpdated": "2024-08-06T20:50:18.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5394
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/69302 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/97763 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:49.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "69302", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69302" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-08T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "69302", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69302" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "69302", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69302" }, { "name": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701", "refsource": "CONFIRM", "url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701" }, { "name": "campusswitch-cve20145394-info-disc(97763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5394", "datePublished": "2018-01-08T19:00:00", "dateReserved": "2014-08-22T00:00:00", "dateUpdated": "2024-08-06T11:41:49.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6570
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6570", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6570", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-16T23:46:14.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6569
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6569", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-17T02:36:51.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8572
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-373182 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, |
Version: AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions, |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,", "vendor": "n/a", "versions": [ { "status": "affected", "version": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions," } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "SSH Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-02T19:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2014-8572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,", "version": { "version_data": [ { "version_value": "AC6605,AC6605,ACU,S2300, S3300,S2700, S3700,S5300, S5700,S6300, S6700,S7700, S9300,S9300E, S9700, AC6605 AC6605 V200R001C00, AC6605 V200R002C00,ACU ACU V200R001C00, ACU V200R002C00,S2300, S3300, V100R006C05 and earlier versions,S2700, S3700,S5300, S5700, V100R006,?S6300, S6700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions,S7700, S9300, V100R006,S9300E, S9700 V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions," } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei AC6605 with software V200R001C00; AC6605 with software V200R002C00; ACU with software V200R001C00; ACU with software V200R002C00; S2300, S3300, S2700, S3700 with software V100R006C05 and earlier versions; S5300, S5700, S6300, S6700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions; S7700, S9300, S9300E, S9700 with software V100R006, V200R001, V200R002, V200R003, V200R005C00SPC300 and earlier versions could allow remote attackers to send a special SSH packet to the VRP device to cause a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SSH Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-373182", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-373182" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2014-8572", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2014-10-31T00:00:00", "dateUpdated": "2024-08-06T13:18:48.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3913
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:56:16.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-08T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm", "refsource": "CONFIRM", "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3913", "datePublished": "2017-06-08T21:00:00", "dateReserved": "2015-05-12T00:00:00", "dateUpdated": "2024-08-06T05:56:16.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6571
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.850Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-20T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6571", "datePublished": "2013-06-20T15:00:00Z", "dateReserved": "2013-06-20T00:00:00Z", "dateUpdated": "2024-09-16T21:08:50.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }