CNVD-2016-11302

Vulnerability from cnvd - Published: 2016-11-18
VLAI Severity ?
Title
多款华为产品存在内存泄露漏洞
Description
Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。 多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。
Severity
Patch Name
多款华为产品存在内存泄露漏洞的补丁
Patch Description
Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。 多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已提供漏洞修补方案,请关注如下链接及时更新: http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn

Reference
http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn
Impacted products
Name
['Huawei AR3200 V200R007C00', 'Huawei AR3200 V200R005C32', 'Huawei AR3200 V200R005C20', 'Huawei S7700 V200R006C00', 'Huawei S7700 V200R008C00', 'Huawei S9700 V200R006C00', 'Huawei S9700 V200R008C00', 'Huawei S12700 V200R008C00', 'Huawei S6700 V200R008C00', 'Huawei S6300 V200R008C00', 'Huawei S5700 V200R006C00', 'Huawei S5700 V200R008C00', 'Huawei S5300 V200R006C00', 'Huawei S5300 V200R007C00', 'Huawei S5300 V200R008C00', 'Huawei S9300 V200R006C00', 'Huawei S9300 V200R008C00', 'Huawei S12700 V200R007C00', 'Huawei S5700 V200R007C00', 'Huawei S6300 V200R007C00', 'Huawei S6700 V200R007C00', 'Huawei S7700 V200R007C00', 'Huawei S9300 V200R007C00', 'Huawei S9700 V200R007C00']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-8797"
    }
  },
  "description": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002",
  "discovererName": "\u534e\u4e3a",
  "formalWay": "\u5382\u5546\u5df2\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u8865\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5982\u4e0b\u94fe\u63a5\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-11302",
  "openTime": "2016-11-18",
  "patchDescription": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei AR3200 V200R007C00",
      "Huawei AR3200 V200R005C32",
      "Huawei AR3200 V200R005C20",
      "Huawei S7700  V200R006C00",
      "Huawei S7700  V200R008C00",
      "Huawei S9700  V200R006C00",
      "Huawei S9700  V200R008C00",
      "Huawei S12700  V200R008C00",
      "Huawei S6700  V200R008C00",
      "Huawei S6300  V200R008C00",
      "Huawei S5700  V200R006C00",
      "Huawei S5700  V200R008C00",
      "Huawei S5300  V200R006C00",
      "Huawei S5300  V200R007C00",
      "Huawei S5300  V200R008C00",
      "Huawei S9300  V200R006C00",
      "Huawei S9300  V200R008C00",
      "Huawei S12700 V200R007C00",
      "Huawei S5700 V200R007C00",
      "Huawei S6300 V200R007C00",
      "Huawei S6700 V200R007C00",
      "Huawei S7700 V200R007C00",
      "Huawei S9300 V200R007C00",
      "Huawei S9700 V200R007C00"
    ]
  },
  "referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
  "serverity": "\u4e2d",
  "submitTime": "2016-11-18",
  "title": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…