All the vulnerabilites related to huawei - s5310hi
cve-2015-8677
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:20.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-14T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8677", "datePublished": "2016-04-14T15:00:00", "dateReserved": "2015-12-25T00:00:00", "dateUpdated": "2024-08-06T08:29:20.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8676
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:20.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-14T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8676", "datePublished": "2016-04-14T15:00:00", "dateReserved": "2015-12-25T00:00:00", "dateUpdated": "2024-08-06T08:29:20.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201604-0328
Vulnerability from variot
Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0328", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s7700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5720ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5720ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s3300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s9700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s2300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s5720hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s3300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s9300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s2300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s7700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5720hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s9300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s2350ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s6300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s5720hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5720ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s3300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s3300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5720ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph002" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph009" }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s3300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5720ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s5310hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s5720hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s2300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s2300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r006sph003" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r006c00" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r005sph008" }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5720hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r005c00" }, { "model": "s5300si", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300ei v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300ei v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8677" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported the issue.", "sources": [ { "db": "BID", "id": "90912" } ], "trust": 0.3 }, "cve": "CVE-2015-8677", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-8677", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2016-02289", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-86638", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-8677", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-8677", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2016-02289", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-86638", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-8677", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "VULHUB", "id": "VHN-86638" }, { "db": "VULMON", "id": "CVE-2015-8677" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information. HuaweiS5300EI is a Huawei S series switch product. A number of Huawei products have a memory leak vulnerability in the HTTPS or SFTP server, allowing remote attackers to consume memory and log in and out of the HTTPS or SFTP server for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause a memory exhaustion, denying service to legitimate users. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: using V200R003C00 version and V200R005C00 version software Huawei S5300EI , S5300SI , S5310HI , S6300EI ,use V200R003C00 Version, V200R005C00 version and V200R006C00 version software Huawei S2350EI , S5300LI , S9300 , S7700 , S9700 ,use V200R006C00 version software Huawei S5720HI, S5720EI, Huawei S2300, S3300 using V100R006C05 software", "sources": [ { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "BID", "id": "90912" }, { "db": "VULHUB", "id": "VHN-86638" }, { "db": "VULMON", "id": "CVE-2015-8677" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8677", "trust": 3.5 }, { "db": "JVNDB", "id": "JVNDB-2015-007108", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-314", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-02289", "trust": 0.6 }, { "db": "BID", "id": "90912", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-86638", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-8677", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "VULHUB", "id": "VHN-86638" }, { "db": "VULMON", "id": "CVE-2015-8677" }, { "db": "BID", "id": "90912" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "id": "VAR-201604-0328", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "VULHUB", "id": "VHN-86638" } ], "trust": 1.6153170325 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" } ] }, "last_update_date": "2023-12-18T12:44:55.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20160113-03-Switch", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" }, { "title": "Patches for various Huawei product switch memory leak vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/74355" }, { "title": "Multiple Huawei Product memory leak vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60969" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86638" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8677" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8677" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/90912" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "VULHUB", "id": "VHN-86638" }, { "db": "VULMON", "id": "CVE-2015-8677" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-02289" }, { "db": "VULHUB", "id": "VHN-86638" }, { "db": "VULMON", "id": "CVE-2015-8677" }, { "db": "BID", "id": "90912" }, { "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "db": "NVD", "id": "CVE-2015-8677" }, { "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02289" }, { "date": "2016-04-14T00:00:00", "db": "VULHUB", "id": "VHN-86638" }, { "date": "2016-04-14T00:00:00", "db": "VULMON", "id": "CVE-2015-8677" }, { "date": "2016-01-13T00:00:00", "db": "BID", "id": "90912" }, { "date": "2016-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "date": "2016-04-14T15:59:03.857000", "db": "NVD", "id": "CVE-2015-8677" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02289" }, { "date": "2019-06-20T00:00:00", "db": "VULHUB", "id": "VHN-86638" }, { "date": "2019-06-20T00:00:00", "db": "VULMON", "id": "CVE-2015-8677" }, { "date": "2016-07-06T14:51:00", "db": "BID", "id": "90912" }, { "date": "2016-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007108" }, { "date": "2019-06-20T14:26:28.073000", "db": "NVD", "id": "CVE-2015-8677" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007108" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-314" } ], "trust": 0.6 } }
var-201604-0327
Vulnerability from variot
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s9300", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s7700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s3300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s3300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s2300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s6300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s3300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s3300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s3300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5310hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300ei v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300ei v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8676" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported the issue.", "sources": [ { "db": "BID", "id": "90893" } ], "trust": 0.3 }, "cve": "CVE-2015-8676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-8676", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2016-02290", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-86637", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-8676", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-8676", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-02290", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-313", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-86637", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;", "sources": [ { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "BID", "id": "90893" }, { "db": "VULHUB", "id": "VHN-86637" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8676", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2015-007104", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-313", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-02290", "trust": 0.6 }, { "db": "BID", "id": "90893", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-86637", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "BID", "id": "90893" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "id": "VAR-201604-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" } ], "trust": 1.6153170325 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" } ] }, "last_update_date": "2023-12-18T13:44:13.781000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20160113-02-Switch", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "title": "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/74357" }, { "title": "Multiple Huawei Product memory leak vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60968" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 }, { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676" }, { "trust": 0.6, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "BID", "id": "90893" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02290" }, { "date": "2016-04-14T00:00:00", "db": "VULHUB", "id": "VHN-86637" }, { "date": "2016-01-13T00:00:00", "db": "BID", "id": "90893" }, { "date": "2016-04-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "date": "2016-04-14T15:59:02.980000", "db": "NVD", "id": "CVE-2015-8676" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02290" }, { "date": "2019-06-20T00:00:00", "db": "VULHUB", "id": "VHN-86637" }, { "date": "2016-07-06T14:51:00", "db": "BID", "id": "90893" }, { "date": "2016-04-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "date": "2019-06-20T13:54:56.177000", "db": "NVD", "id": "CVE-2015-8676" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-313" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007104" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-313" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | s2350ei_firmware | * | |
huawei | s2350ei_firmware | * | |
huawei | s2350ei | - | |
huawei | s5300ei_firmware | * | |
huawei | s5300ei_firmware | * | |
huawei | s5300ei | - | |
huawei | s5300si_firmware | * | |
huawei | s5300si_firmware | * | |
huawei | s5300si | - | |
huawei | s5310hi_firmware | * | |
huawei | s5310hi_firmware | * | |
huawei | s5310hi | - | |
huawei | s6300ei_firmware | * | |
huawei | s6300ei_firmware | * | |
huawei | s6300ei | - | |
huawei | s5300li_firmware | * | |
huawei | s5300li_firmware | * | |
huawei | s5300li | - | |
huawei | s9300_firmware | * | |
huawei | s9300_firmware | * | |
huawei | s9300_firmware | v200r003c00 | |
huawei | s9300 | - | |
huawei | s7700_firmware | * | |
huawei | s7700_firmware | * | |
huawei | s7700_firmware | v200r003c00 | |
huawei | s7700 | - | |
huawei | s9700_firmware | * | |
huawei | s9700_firmware | * | |
huawei | s9700_firmware | v200r003c00 | |
huawei | s9700 | - | |
huawei | s2300_firmware | * | |
huawei | s2300 | - | |
huawei | s3300_firmware | * | |
huawei | s3300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39008864-1F6B-41B1-A07B-9F5227669ECF", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1457C7-F741-4A7B-B4D8-126190A0B870", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19788976-18BB-4B7A-AE46-558C779A9F2C", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7245FC5C-EF30-48A0-9294-4F61A1F784AE", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6FE64-24E7-4126-81EB-CEDD5552CA69", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "149C309F-27C3-4B91-B83D-1A6D3877BB41", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2218055E-B6F7-4C63-AA46-3563C4F9546A", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE336196-B997-4613-A21B-6E543C12BFD6", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "473B6E52-E60F-4D3C-9028-E362DF2A8327", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9D64809-AD3A-4057-ABE6-EA53556F894A", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A6DC9F-6B9A-4A9B-AA9D-E50C45675C36", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFF0C0-AA17-4AA1-A418-4759D1A58852", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5961FF81-109C-4CF8-942D-ED9908981B69", "versionEndExcluding": "v200r001sph023", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DA3D055-9991-44A6-A250-C5119BF95857", "versionEndExcluding": "v200r003c00", "versionStartIncluding": "v200r002c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "06AD9ACA-E0C3-4096-BE50-94E717CDA318", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets." }, { "lang": "es", "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI y S5300LI con software V200R001C00 en versiones anteriores a V200R001SPH018, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; switches de la serie Campus S9300, S7700 y S9700 con software V200R001C00 en versiones anteriores a V200R001SPH023, V200R002C00 en versiones anteriores a V200R003SPH011 y V200R003C00 en versiones anteriores a V200R003SPH011; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio) a trav\u00e9s de un gran n\u00famero de paquetes ICMPv6." } ], "id": "CVE-2015-8676", "lastModified": "2024-11-21T02:38:56.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T15:59:02.980", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD722A3F-A17A-4C2F-BF97-B4EC3E1313AB", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A16F8DA-E9B5-4501-BD07-DCCBC998B5B8", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "438F46FA-6373-4323-B2C6-F4D6CFABD675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1818A8DD-58A0-41B2-9E8B-EC1851784654", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300si_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77856A0-E46B-4492-8C9F-5B5FEEFEDCED", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300si:-:*:*:*:*:*:*:*", "matchCriteriaId": "498B6006-41C9-4853-8CCD-1A3A122FAB51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57D589CC-550B-4C9E-827C-3F745B9E86C5", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5310hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9932CAA1-D2DA-4DB5-9068-36A3F8B99558", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5310hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72B3B4B-1B7A-486C-A8BD-662390D585EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FEE8AC-82C1-45A1-AEEA-90DA113B28FC", "versionEndExcluding": "v200r001sph018", "versionStartIncluding": "v200r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s6300ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B767F3-90A5-4B2D-BAA1-8FA0FC0A3FA0", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r002c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s6300ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC63D2FE-F8BB-4A20-8DD6-801A12C06F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7C59A1-526B-43D1-BFF6-A78DB487B228", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "478CEF58-3701-46B7-9CB6-3AB47E502FC3", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s5300li_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFCF982C-559F-4074-9C74-C0C473A93262", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5300li:-:*:*:*:*:*:*:*", "matchCriteriaId": "3696874A-E462-482F-8CA4-4FAC37C8641E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA26DEFB-04A3-41F9-A8B3-F3AC06B5EC8A", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E5D2580-1C41-4367-8A4D-298030C051F1", "versionEndExcluding": "v200r005sph008", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s2350ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "909F4FF5-B874-4E0B-A6F1-A2E9FE110381", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2350ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A8844AD-71F1-4139-B6CA-5534942DA424", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B0F9954-F0E2-4D1A-8641-E32E424B80FD", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14879FE3-07A4-4F07-9325-F153170E2017", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "614CAF39-2122-4206-905C-C6743656C73A", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0E2E640-EC67-40CC-8EF2-3E61195E8B68", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "398CABF6-F1D2-4A66-B4EE-45CB2A0F1B6E", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s9700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5F28803-5FC5-4904-9D79-0A3B15F8D1C8", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BCAD4F5-CA86-441B-A542-6AA797F621B5", "versionEndExcluding": "v200r003sph011", "versionStartIncluding": "v200r003c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CA11961-ED08-4931-88F4-AC1E9D191E5D", "versionEndExcluding": "v200r005sph009", "versionStartIncluding": "v200r005c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:s7700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75C05E42-CCCD-446F-BDAB-0CD8FDBEE519", "versionEndExcluding": "v200r006sph003", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720hi_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5A073-7D11-4875-A7C4-F1298AF6A86D", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB64BC36-693E-4101-9C13-4A4C572A4EDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s5720ei_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "991916AB-5080-42CA-80CE-AFD1E69005E7", "versionEndExcluding": "v200r006sph002", "versionStartIncluding": "v200r006c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7B06975-BD37-452D-9782-B768610D3777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D6DD87-D00C-4AB9-AC7F-BCF066DF6030", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "17566603-275F-4E6B-B5D9-4A716EEC03DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:s3300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB47AE0C-67AA-4605-B1F2-C51065C8786F", "versionEndExcluding": "v100r006sph022", "versionStartIncluding": "v100r006c05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1410A1-ADCC-474F-ABEE-F0FE48E4CD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, and S6300EI Campus series switches with software V200R003C00 before V200R003SPH011 and V200R005C00 before V200R005SPH008; S2350EI and S5300LI Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH008, and V200R006C00 before V200R006SPH002; S9300, S7700, and S9700 Campus series switches with software V200R003C00 before V200R003SPH011, V200R005C00 before V200R005SPH009, and V200R006C00 before V200R006SPH003; S5720HI and S5720EI Campus series switches with software V200R006C00 before V200R006SPH002; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote authenticated users to cause a denial of service (memory consumption and device restart) by logging in and out of the (1) HTTPS or (2) SFTP server, related to SSL session information." }, { "lang": "es", "value": "Fuga de memoria en switches Huawei de la serie Campus S5300EI, S5300SI, S5310HI y S6300EI con software V200R003C00 en versiones anteriores a V200R003SPH011 y V200R005C00 en versiones anteriores a V200R005SPH008; switches de la serie Campus S2350EI y S5300LI con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH008 y V200R006C00 en versiones anteriores a V200R006SPH002; switches de la serie Campus S9300, S7700 y S9700 con software V200R003C00 en versiones anteriores a V200R003SPH011, V200R005C00 en versiones anteriores a V200R005SPH009 y V200R006C00 en versiones anteriores a V200R006SPH003; switches de la serie Campus S5720HI y S5720EI con software V200R006C00 en versiones anteriores a V200R006SPH002; y switches de la serie Campus S2300 y S3300 con software V100R006C05 en versiones anteriores a V100R006SPH022 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria y reinicio de dispositivo) iniciando sesi\u00f3n y cerr\u00e1ndola en el servidor (1) HTTPS o (2) SFTP, relacionada con la informaci\u00f3n de sesi\u00f3n SSL." } ], "id": "CVE-2015-8677", "lastModified": "2024-11-21T02:38:57.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T15:59:03.857", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }