CVE-2016-8773 (GCVE-0-2016-8773)

Vulnerability from cvelistv5 – Published: 2017-04-02 20:00 – Updated: 2024-08-06 02:35
VLAI?
Summary
Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.
Severity ?
No CVSS data available.
CWE
  • input validation
Assigner
References
Impacted products
Vendor Product Version
n/a S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 Affected: S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:35:00.177Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
          },
          {
            "name": "94285",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94285"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00"
            }
          ]
        }
      ],
      "datePublic": "2017-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "input validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-03T09:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
        },
        {
          "name": "94285",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94285"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2016-8773",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "S5300,S5700,S6300,S6700,S7700,9300,9700,S12700 S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00,S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00,S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00,S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00,S7700 with software V200R007C00, V200R008C00, V200R009C00,S9300 with software V200R007C00, V200R008C00, V200R009C00,S9700 with software V200R007C00, V200R008C00, V200R009C00 and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "input validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en"
            },
            {
              "name": "94285",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94285"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2016-8773",
    "datePublished": "2017-04-02T20:00:00",
    "dateReserved": "2016-10-18T00:00:00",
    "dateUpdated": "2024-08-06T02:35:00.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10CBC93B-5CF6-45BF-A90A-84B7693E27FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC4803A7-44B2-41BA-814D-151239B92CEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B17A34EF-677D-4264-82FB-F7F582C9F56B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD601FFF-E623-4ADC-B286-D11B8004D7CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6B13D4-07F3-4CB5-8194-89781E685A78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5454BC21-A04F-4B3D-8533-2414B6E1BC8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F31814D-5879-4FB9-BDAE-01CFC75D9AF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"336AA440-AEF4-482B-A037-8976DC38BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B2DE9FE-5EC9-462E-86F0-EE772C944DFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4907FBB8-5157-460D-9240-DD7D610C0FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCF23DAE-1215-41B2-88C5-4436D846266C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B18ABC1-A970-472A-A8BF-934D1180930E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40745A01-E5AC-4207-A34F-D8E7F7231F83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48B5A9B7-A931-4806-8AC7-302C6CA49CF1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C330A14-C941-4B28-AA9C-B78A96A9011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6818ECD-730B-40D6-9108-B8540CC4BF1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"939C73D9-E0E9-47A5-970E-6C84F5ECD2D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B39BBA0F-8EB9-40BA-B8DF-5C735F2216A3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B7B7285-F4C6-415C-A948-D7612750A77D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D6DC0AF-017E-41BC-A19D-F9AA055F5224\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"749B68B9-9F62-4E7A-AC86-F4073BA32E18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F18D9776-5CE7-4DD3-9119-7FB08A35B955\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF4AF711-D921-4261-A459-2A0780EA951F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DA5CF67-A58B-4666-B87E-712507233453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9EA93B5-01A5-4506-9B0A-993621E6940E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2377CD30-6F57-46CB-9DD1-E29458A7D928\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"886E9D1F-25FA-41FA-A64B-E42B9910D2B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E7DB9D3-BB34-49BE-8302-A054D79FE8D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEF2710B-60F7-42A5-83AA-14589DC0358D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D78DAB13-32AA-4813-AB0A-0EA870F41183\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01A0EC8F-6A8A-487F-A92A-789E3789788F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.\"}, {\"lang\": \"es\", \"value\": \"Huawei S5300 con software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 con software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 con software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 con software V200R007C00, V200R008C00, V200R009C00; S9300 con software V200R007C00, V200R008C00, V200R009C00; S9700 con software V200R007C00, V200R008C00, V200R009C00; y S12700 con software V200R007C00, V200R007C01, V200R008C00, V200R009C00 permiten al atacante provocar una condici\\u00f3n de denegaci\\u00f3n de servicio enviando paquetes MPLS mal formados.\"}]",
      "id": "CVE-2016-8773",
      "lastModified": "2024-11-21T03:00:01.690",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-04-02T20:59:01.407",
      "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/94285\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/94285\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-8773\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-04-02T20:59:01.407\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Huawei S5300 with software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 with software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 with software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 with software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 with software V200R007C00, V200R008C00, V200R009C00; S9300 with software V200R007C00, V200R008C00, V200R009C00; S9700 with software V200R007C00, V200R008C00, V200R009C00; and S12700 with software V200R007C00, V200R007C01, V200R008C00, V200R009C00 allow the attacker to cause a denial of service condition by sending malformed MPLS packets.\"},{\"lang\":\"es\",\"value\":\"Huawei S5300 con software V200R003C00, V200R007C00, V200R008C00, V200R009C00; S5700 con software V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C03, V200R007C00, V200R008C00, V200R009C00; S6300 con software V200R003C00, V200R005C00, V200R008C00, V200R009C00; S6700 con software V200R001C00, V200R001C01, V200R002C00, V200R003C00, V200R005C00, V200R008C00, V200R009C00; S7700 con software V200R007C00, V200R008C00, V200R009C00; S9300 con software V200R007C00, V200R008C00, V200R009C00; S9700 con software V200R007C00, V200R008C00, V200R009C00; y S12700 con software V200R007C00, V200R007C01, V200R008C00, V200R009C00 permiten al atacante provocar una condici\u00f3n de denegaci\u00f3n de servicio enviando paquetes MPLS mal formados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CBC93B-5CF6-45BF-A90A-84B7693E27FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4803A7-44B2-41BA-814D-151239B92CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17A34EF-677D-4264-82FB-F7F582C9F56B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD601FFF-E623-4ADC-B286-D11B8004D7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6B13D4-07F3-4CB5-8194-89781E685A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454BC21-A04F-4B3D-8533-2414B6E1BC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F31814D-5879-4FB9-BDAE-01CFC75D9AF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336AA440-AEF4-482B-A037-8976DC38BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2DE9FE-5EC9-462E-86F0-EE772C944DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4907FBB8-5157-460D-9240-DD7D610C0FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCF23DAE-1215-41B2-88C5-4436D846266C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B18ABC1-A970-472A-A8BF-934D1180930E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40745A01-E5AC-4207-A34F-D8E7F7231F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B5A9B7-A931-4806-8AC7-302C6CA49CF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C330A14-C941-4B28-AA9C-B78A96A9011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6818ECD-730B-40D6-9108-B8540CC4BF1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"939C73D9-E0E9-47A5-970E-6C84F5ECD2D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39BBA0F-8EB9-40BA-B8DF-5C735F2216A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B7B7285-F4C6-415C-A948-D7612750A77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6DC0AF-017E-41BC-A19D-F9AA055F5224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749B68B9-9F62-4E7A-AC86-F4073BA32E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18D9776-5CE7-4DD3-9119-7FB08A35B955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4AF711-D921-4261-A459-2A0780EA951F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA5CF67-A58B-4666-B87E-712507233453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EA93B5-01A5-4506-9B0A-993621E6940E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2377CD30-6F57-46CB-9DD1-E29458A7D928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886E9D1F-25FA-41FA-A64B-E42B9910D2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7DB9D3-BB34-49BE-8302-A054D79FE8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF2710B-60F7-42A5-83AA-14589DC0358D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78DAB13-32AA-4813-AB0A-0EA870F41183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A0EC8F-6A8A-487F-A92A-789E3789788F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94285\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161111-01-mpls-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…