CNVD-2016-11302
Vulnerability from cnvd - Published: 2016-11-18
VLAI Severity ?
Title
多款华为产品存在内存泄露漏洞
Description
Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。
多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。
Severity
中
Patch Name
多款华为产品存在内存泄露漏洞的补丁
Patch Description
Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。
多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已提供漏洞修补方案,请关注如下链接及时更新: http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn
Reference
http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn
Impacted products
| Name | ['Huawei AR3200 V200R007C00', 'Huawei AR3200 V200R005C32', 'Huawei AR3200 V200R005C20', 'Huawei S7700 V200R006C00', 'Huawei S7700 V200R008C00', 'Huawei S9700 V200R006C00', 'Huawei S9700 V200R008C00', 'Huawei S12700 V200R008C00', 'Huawei S6700 V200R008C00', 'Huawei S6300 V200R008C00', 'Huawei S5700 V200R006C00', 'Huawei S5700 V200R008C00', 'Huawei S5300 V200R006C00', 'Huawei S5300 V200R007C00', 'Huawei S5300 V200R008C00', 'Huawei S9300 V200R006C00', 'Huawei S9300 V200R008C00', 'Huawei S12700 V200R007C00', 'Huawei S5700 V200R007C00', 'Huawei S6300 V200R007C00', 'Huawei S6700 V200R007C00', 'Huawei S7700 V200R007C00', 'Huawei S9300 V200R007C00', 'Huawei S9700 V200R007C00'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-8797"
}
},
"description": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002",
"discovererName": "\u534e\u4e3a",
"formalWay": "\u5382\u5546\u5df2\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u8865\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5982\u4e0b\u94fe\u63a5\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-11302",
"openTime": "2016-11-18",
"patchDescription": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Huawei AR3200 V200R007C00",
"Huawei AR3200 V200R005C32",
"Huawei AR3200 V200R005C20",
"Huawei S7700 V200R006C00",
"Huawei S7700 V200R008C00",
"Huawei S9700 V200R006C00",
"Huawei S9700 V200R008C00",
"Huawei S12700 V200R008C00",
"Huawei S6700 V200R008C00",
"Huawei S6300 V200R008C00",
"Huawei S5700 V200R006C00",
"Huawei S5700 V200R008C00",
"Huawei S5300 V200R006C00",
"Huawei S5300 V200R007C00",
"Huawei S5300 V200R008C00",
"Huawei S9300 V200R006C00",
"Huawei S9300 V200R008C00",
"Huawei S12700 V200R007C00",
"Huawei S5700 V200R007C00",
"Huawei S6300 V200R007C00",
"Huawei S6700 V200R007C00",
"Huawei S7700 V200R007C00",
"Huawei S9300 V200R007C00",
"Huawei S9700 V200R007C00"
]
},
"referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
"serverity": "\u4e2d",
"submitTime": "2016-11-18",
"title": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…