CNVD-2019-25515

Vulnerability from cnvd - Published: 2019-08-02
VLAI Severity ?
Title
多款Huawei S系列交换机输入验证错误漏洞
Description
Huawei S12700等都是中国华为(Huawei)公司的一款企业级交换机产品。 多款Huawei S系列交换机存在输入验证错误漏洞,该漏洞源于程序对Http报文特定参数的校验不充分。远程攻击者可通过发送构造的报文利用该漏洞导致交换机重启,造成拒绝服务。
Severity
Patch Name
多款Huawei S系列交换机输入验证错误漏洞的补丁
Patch Description
Huawei S12700等都是中国华为(Huawei)公司的一款企业级交换机产品。 多款Huawei S系列交换机存在输入验证错误漏洞,该漏洞源于程序对Http报文特定参数的校验不充分。远程攻击者可通过发送构造的报文利用该漏洞导致交换机重启,造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn

Reference
https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn
Impacted products
Name
['Huawei S12700 V200R005C00', 'Huawei S12700 V200R006C00', 'Huawei S12700 V200R008C00', 'Huawei S12700 V200R007C00', 'Huawei S2300 V200R003C00', 'Huawei S12700 V200R010C00', 'Huawei S1700 V200R009C00', 'Huawei S1700 V200R010C00', 'Huawei S12700 V200R012C00', 'Huawei S12700 V200R013C00', 'Huawei S12700 V200R011C10', 'Huawei S1700 V200R008C00', 'Huawei S1700 V200R011C10', 'Huawei S1700 V200R012C00']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-5285",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5285"
    }
  },
  "description": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u4f01\u4e1a\u7ea7\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\n\n\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u5bf9Http\u62a5\u6587\u7279\u5b9a\u53c2\u6570\u7684\u6821\u9a8c\u4e0d\u5145\u5206\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6784\u9020\u7684\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4ea4\u6362\u673a\u91cd\u542f\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Codesafe Team of Legendsec at Qi\u0027anxin Group",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-25515",
  "openTime": "2019-08-02",
  "patchDescription": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u4f01\u4e1a\u7ea7\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u5bf9Http\u62a5\u6587\u7279\u5b9a\u53c2\u6570\u7684\u6821\u9a8c\u4e0d\u5145\u5206\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6784\u9020\u7684\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4ea4\u6362\u673a\u91cd\u542f\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei S12700 V200R005C00",
      "Huawei S12700 V200R006C00",
      "Huawei S12700  V200R008C00",
      "Huawei S12700 V200R007C00",
      "Huawei S2300 V200R003C00",
      "Huawei S12700 V200R010C00",
      "Huawei S1700 V200R009C00",
      "Huawei S1700 V200R010C00",
      "Huawei S12700 V200R012C00",
      "Huawei S12700 V200R013C00",
      "Huawei S12700 V200R011C10",
      "Huawei S1700 V200R008C00",
      "Huawei S1700 V200R011C10",
      "Huawei S1700 V200R012C00"
    ]
  },
  "referenceLink": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn",
  "serverity": "\u9ad8",
  "submitTime": "2019-05-22",
  "title": "\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…