CNVD-2017-37496
Vulnerability from cnvd - Published: 2017-12-19
VLAI Severity ?
Title
多款Huawei产品资源耗尽漏洞
Description
Huawei Secospace USG系列都是华为面向企业、IDC、校园网和运营商等客户推出的新一代专业入侵防御和防火墙产品;DP300及TP3206均是一款面向高端客户的一体化桌面智真;HUAWEI VP9660是华为公司以客户需求为导向,结合强大的网络设备制造优势,开发出的新一代业界最大容量、可灵活分配端口、平滑扩容的全适配MCU,是具有1080p60全编全解超强处理能力的多媒体交换平台。
多款Huawei产品存在资源耗尽漏洞,该漏洞是由于设备未能对H.323报文中某些字段进行正确处理。未经身份认证的远程攻击者通过向设备发送精心构造的H.323报文,成功利用该漏洞导致系统中栈内存资源耗尽,某些服务异常。
Severity
中
Patch Name
多款Huawei产品资源耗尽漏洞的补丁
Patch Description
Huawei Secospace USG系列都是华为面向企业、IDC、校园网和运营商等客户推出的新一代专业入侵防御和防火墙产品;DP300及TP3206均是一款面向高端客户的一体化桌面智真;HUAWEI VP9660是华为公司以客户需求为导向,结合强大的网络设备制造优势,开发出的新一代业界最大容量、可灵活分配端口、平滑扩容的全适配MCU,是具有1080p60全编全解超强处理能力的多媒体交换平台。
多款Huawei产品存在资源耗尽漏洞,该漏洞是由于设备未能对H.323报文中某些字段进行正确处理。未经身份认证的远程攻击者通过向设备发送精心构造的H.323报文,成功利用该漏洞导致系统中栈内存资源耗尽,某些服务异常。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn
Reference
http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn
Impacted products
| Name | ['Huawei Secospace USG6500 V500R001C00', 'Huawei Secospace USG6600 V500R001C00', 'Huawei DP300 V500R002C00', 'Huawei TP3206 V100R002C00', 'Huawei VP9660 V500R002C00', 'Huawei VP9660 V500R002C10', 'Huawei Secospace USG6300 V500R001C00', 'Huawei Secospace USG6300 V500R001C20', 'Huawei Secospace USG6300 V500R001C30', 'Huawei Secospace USG6300 V500R001C50', 'Huawei Secospace USG6500 V500R001C20', 'Huawei Secospace USG6500 V500R001C30', 'Huawei Secospace USG6500 V500R001C50', 'Huawei Secospace USG6600 V500R001C20', 'Huawei Secospace USG6600 V500R001C30', 'Huawei Secospace USG6600 V500R001C50'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-17166"
}
},
"description": "Huawei Secospace USG\u7cfb\u5217\u90fd\u662f\u534e\u4e3a\u9762\u5411\u4f01\u4e1a\u3001IDC\u3001\u6821\u56ed\u7f51\u548c\u8fd0\u8425\u5546\u7b49\u5ba2\u6237\u63a8\u51fa\u7684\u65b0\u4e00\u4ee3\u4e13\u4e1a\u5165\u4fb5\u9632\u5fa1\u548c\u9632\u706b\u5899\u4ea7\u54c1\uff1bDP300\u53caTP3206\u5747\u662f\u4e00\u6b3e\u9762\u5411\u9ad8\u7aef\u5ba2\u6237\u7684\u4e00\u4f53\u5316\u684c\u9762\u667a\u771f\uff1bHUAWEI VP9660\u662f\u534e\u4e3a\u516c\u53f8\u4ee5\u5ba2\u6237\u9700\u6c42\u4e3a\u5bfc\u5411\uff0c\u7ed3\u5408\u5f3a\u5927\u7684\u7f51\u7edc\u8bbe\u5907\u5236\u9020\u4f18\u52bf\uff0c\u5f00\u53d1\u51fa\u7684\u65b0\u4e00\u4ee3\u4e1a\u754c\u6700\u5927\u5bb9\u91cf\u3001\u53ef\u7075\u6d3b\u5206\u914d\u7aef\u53e3\u3001\u5e73\u6ed1\u6269\u5bb9\u7684\u5168\u9002\u914dMCU\uff0c\u662f\u5177\u67091080p60\u5168\u7f16\u5168\u89e3\u8d85\u5f3a\u5904\u7406\u80fd\u529b\u7684\u591a\u5a92\u4f53\u4ea4\u6362\u5e73\u53f0\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u8bbe\u5907\u672a\u80fd\u5bf9H.323\u62a5\u6587\u4e2d\u67d0\u4e9b\u5b57\u6bb5\u8fdb\u884c\u6b63\u786e\u5904\u7406\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u5411\u8bbe\u5907\u53d1\u9001\u7cbe\u5fc3\u6784\u9020\u7684H.323\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u4e2d\u6808\u5185\u5b58\u8d44\u6e90\u8017\u5c3d\uff0c\u67d0\u4e9b\u670d\u52a1\u5f02\u5e38\u3002",
"discovererName": "Huawei",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-37496",
"openTime": "2017-12-19",
"patchDescription": "Huawei Secospace USG\u7cfb\u5217\u90fd\u662f\u534e\u4e3a\u9762\u5411\u4f01\u4e1a\u3001IDC\u3001\u6821\u56ed\u7f51\u548c\u8fd0\u8425\u5546\u7b49\u5ba2\u6237\u63a8\u51fa\u7684\u65b0\u4e00\u4ee3\u4e13\u4e1a\u5165\u4fb5\u9632\u5fa1\u548c\u9632\u706b\u5899\u4ea7\u54c1\uff1bDP300\u53caTP3206\u5747\u662f\u4e00\u6b3e\u9762\u5411\u9ad8\u7aef\u5ba2\u6237\u7684\u4e00\u4f53\u5316\u684c\u9762\u667a\u771f\uff1bHUAWEI VP9660\u662f\u534e\u4e3a\u516c\u53f8\u4ee5\u5ba2\u6237\u9700\u6c42\u4e3a\u5bfc\u5411\uff0c\u7ed3\u5408\u5f3a\u5927\u7684\u7f51\u7edc\u8bbe\u5907\u5236\u9020\u4f18\u52bf\uff0c\u5f00\u53d1\u51fa\u7684\u65b0\u4e00\u4ee3\u4e1a\u754c\u6700\u5927\u5bb9\u91cf\u3001\u53ef\u7075\u6d3b\u5206\u914d\u7aef\u53e3\u3001\u5e73\u6ed1\u6269\u5bb9\u7684\u5168\u9002\u914dMCU\uff0c\u662f\u5177\u67091080p60\u5168\u7f16\u5168\u89e3\u8d85\u5f3a\u5904\u7406\u80fd\u529b\u7684\u591a\u5a92\u4f53\u4ea4\u6362\u5e73\u53f0\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u8bbe\u5907\u672a\u80fd\u5bf9H.323\u62a5\u6587\u4e2d\u67d0\u4e9b\u5b57\u6bb5\u8fdb\u884c\u6b63\u786e\u5904\u7406\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u5411\u8bbe\u5907\u53d1\u9001\u7cbe\u5fc3\u6784\u9020\u7684H.323\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u4e2d\u6808\u5185\u5b58\u8d44\u6e90\u8017\u5c3d\uff0c\u67d0\u4e9b\u670d\u52a1\u5f02\u5e38\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Huawei Secospace USG6500 V500R001C00",
"Huawei Secospace USG6600 V500R001C00",
"Huawei DP300 V500R002C00",
"Huawei TP3206 V100R002C00",
"Huawei VP9660 V500R002C00",
"Huawei VP9660 V500R002C10",
"Huawei Secospace USG6300 V500R001C00",
"Huawei Secospace USG6300 V500R001C20",
"Huawei Secospace USG6300 V500R001C30",
"Huawei Secospace USG6300 V500R001C50",
"Huawei Secospace USG6500 V500R001C20",
"Huawei Secospace USG6500 V500R001C30",
"Huawei Secospace USG6500 V500R001C50",
"Huawei Secospace USG6600 V500R001C20",
"Huawei Secospace USG6600 V500R001C30",
"Huawei Secospace USG6600 V500R001C50"
]
},
"referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn",
"serverity": "\u4e2d",
"submitTime": "2017-12-18",
"title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…