CNVD-2016-06762

Vulnerability from cnvd - Published: 2016-08-26
VLAI Severity ?
Title
多款Huawei产品远程格式化字符串漏洞
Description
Huawei AR 120等都是中国华为(Huawei)公司的AR系列企业路由器产品。 多款Huawei产品中存在远程格式化字符串漏洞。远程攻击者可利用该漏洞造成拒绝服务。
Severity
Patch Name
多款Huawei产品远程格式化字符串漏洞的补丁
Patch Description
Huawei AR 120等都是中国华为(Huawei)公司的AR系列企业路由器产品。 多款Huawei产品中存在远程格式化字符串漏洞。远程攻击者可利用该漏洞造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160824-01-vrp-en

Reference
http://www.securityfocus.com/bid/92618
Impacted products
Name
['Huawei AR100 200R005', 'Huawei AR100 200R006', 'Huawei AR100 200R007C00', 'Huawei AR120 200R005', 'Huawei AR120 200R006', 'Huawei AR120 200R007C00', 'Huawei AR150 200R005', 'Huawei AR150 200R006', 'Huawei AR150 200R007C00', 'Huawei AR200 200R005', 'Huawei AR200 200R006', 'Huawei AR200 200R007C00', 'Huawei AR550 200R005', 'Huawei AR550 200R006', 'Huawei AR550 200R007C00', 'Huawei AR500 200R005', 'Huawei AR500 200R006', 'Huawei AR500 200R007C00', 'Huawei AR1200 200R005', 'Huawei AR1200 200R006', 'Huawei AR1200 200R007C00', 'Huawei AR2200 200R005', 'Huawei AR2200 200R006', 'Huawei AR2200 200R007C00', 'Huawei AR3600 200R005', 'Huawei AR3600 200R006', 'Huawei AR3600 200R007C00', 'Huawei AR2500 200R005', 'Huawei AR2500 200R006', 'Huawei AR2500 200R007C00', 'Huawei AR3200 200R005', 'Huawei AR3200 200R006', 'Huawei AR3200 200R007C00', 'Huawei NetEngine 16EX 200R007C00', 'Huawei NetEngine 16EX 200R006', 'Huawei NetEngine 16EX 200R005']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "92618"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-6901"
    }
  },
  "description": "Huawei AR 120\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684AR\u7cfb\u5217\u4f01\u4e1a\u8def\u7531\u5668\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u4e2d\u5b58\u5728\u8fdc\u7a0b\u683c\u5f0f\u5316\u5b57\u7b26\u4e32\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Huawei",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160824-01-vrp-en",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-06762",
  "openTime": "2016-08-26",
  "patchDescription": "Huawei AR 120\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684AR\u7cfb\u5217\u4f01\u4e1a\u8def\u7531\u5668\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u4e2d\u5b58\u5728\u8fdc\u7a0b\u683c\u5f0f\u5316\u5b57\u7b26\u4e32\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8fdc\u7a0b\u683c\u5f0f\u5316\u5b57\u7b26\u4e32\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei AR100 200R005",
      "Huawei AR100 200R006",
      "Huawei AR100 200R007C00",
      "Huawei AR120 200R005",
      "Huawei AR120 200R006",
      "Huawei AR120 200R007C00",
      "Huawei AR150 200R005",
      "Huawei AR150 200R006",
      "Huawei AR150 200R007C00",
      "Huawei AR200 200R005",
      "Huawei AR200 200R006",
      "Huawei AR200 200R007C00",
      "Huawei AR550 200R005",
      "Huawei AR550 200R006",
      "Huawei AR550 200R007C00",
      "Huawei AR500 200R005",
      "Huawei AR500 200R006",
      "Huawei AR500 200R007C00",
      "Huawei AR1200 200R005",
      "Huawei AR1200 200R006",
      "Huawei AR1200 200R007C00",
      "Huawei AR2200 200R005",
      "Huawei AR2200 200R006",
      "Huawei AR2200 200R007C00",
      "Huawei AR3600 200R005",
      "Huawei AR3600 200R006",
      "Huawei AR3600 200R007C00",
      "Huawei AR2500 200R005",
      "Huawei AR2500 200R006",
      "Huawei AR2500 200R007C00",
      "Huawei AR3200 200R005",
      "Huawei AR3200 200R006",
      "Huawei AR3200 200R007C00",
      "Huawei NetEngine 16EX 200R007C00",
      "Huawei NetEngine 16EX 200R006",
      "Huawei NetEngine 16EX 200R005"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/92618",
  "serverity": "\u4e2d",
  "submitTime": "2016-08-25",
  "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8fdc\u7a0b\u683c\u5f0f\u5316\u5b57\u7b26\u4e32\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…