CVE-2016-8797 (GCVE-0-2016-8797)

Vulnerability from cvelistv5 – Published: 2017-04-02 20:00 – Updated: 2024-08-06 02:35
VLAI?
Summary
Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.
Severity ?
No CVSS data available.
CWE
  • memory leak
Assigner
References
Impacted products
Vendor Product Version
n/a AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00, Affected: AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:35:02.049Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,"
            }
          ]
        }
      ],
      "datePublic": "2017-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "memory leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-02T19:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2016-8797",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR3200,S12700,S5300,S5700,S6300,S6700,S7700,S9300,S9700 AR3200 V200R007C00, V200R005C32, V200R005C20,S12700 V200R008C00, V200R007C00,S5300 V200R008C00, V200R007C00, V200R006C00,S5700 V200R008C00, V200R007C00, V200R006C00,S6300 V200R008C00, V200R007C00,S6700 V200R008C00, V200R007C00,S7700 V200R008C00, V200R007C00, V200R006C00,S9300 V200R008C00, V200R007C00, V200R006C00,S9700 V200R008C00, V200R007C00, V200R006C00,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "memory leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2016-8797",
    "datePublished": "2017-04-02T20:00:00",
    "dateReserved": "2016-10-18T00:00:00",
    "dateUpdated": "2024-08-06T02:35:02.049Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FE26EE9-2331-4D72-96CF-635A0A4EBE3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10CBC93B-5CF6-45BF-A90A-84B7693E27FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58C2E728-E8F2-461D-A069-4BEC88B94FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6B13D4-07F3-4CB5-8194-89781E685A78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5454BC21-A04F-4B3D-8533-2414B6E1BC8C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5973A534-F961-4A97-B20E-994BA28AFE29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40745A01-E5AC-4207-A34F-D8E7F7231F83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5811970-FE82-4888-A01D-B356B5578296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"939C73D9-E0E9-47A5-970E-6C84F5ECD2D7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF4AF711-D921-4261-A459-2A0780EA951F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DA5CF67-A58B-4666-B87E-712507233453\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2377CD30-6F57-46CB-9DD1-E29458A7D928\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"886E9D1F-25FA-41FA-A64B-E42B9910D2B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E7DB9D3-BB34-49BE-8302-A054D79FE8D6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D78DAB13-32AA-4813-AB0A-0EA870F41183\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.\"}, {\"lang\": \"es\", \"value\": \"Huawei AR3200 con software V200R007C00, V200R005C32, V200R005C20; S12700 con software V200R008C00, V200R007C00; S5300 con software V200R008C00, V200R007C00, V200R006C00; S5700 con software V200R008C00, V200R007C00, V200R006C00; S6300 con software V200R008C00, V200R007C00; S6700 con software V200R008C00, V200R007C00; S7700 con software V200R008C00, V200R007C00, V200R006C00; S9300 con software V200R008C00, V200R007C00, V200R006C00; y S9700 con software V200R008C00, V200R007C00, V200R006C00 permiten a atacantes remotos enviar paquetes Multiprotocol Label Switching (MPLS) anormales para provocar un agotamiento de la memoria.\"}]",
      "id": "CVE-2016-8797",
      "lastModified": "2024-11-21T03:00:06.303",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-04-02T20:59:01.860",
      "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-8797\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-04-02T20:59:01.860\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.\"},{\"lang\":\"es\",\"value\":\"Huawei AR3200 con software V200R007C00, V200R005C32, V200R005C20; S12700 con software V200R008C00, V200R007C00; S5300 con software V200R008C00, V200R007C00, V200R006C00; S5700 con software V200R008C00, V200R007C00, V200R006C00; S6300 con software V200R008C00, V200R007C00; S6700 con software V200R008C00, V200R007C00; S7700 con software V200R008C00, V200R007C00, V200R006C00; S9300 con software V200R008C00, V200R007C00, V200R006C00; y S9700 con software V200R008C00, V200R007C00, V200R006C00 permiten a atacantes remotos enviar paquetes Multiprotocol Label Switching (MPLS) anormales para provocar un agotamiento de la memoria.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C10C07E-5194-4EAB-9AC8-DB87CE52F5FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE26EE9-2331-4D72-96CF-635A0A4EBE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CBC93B-5CF6-45BF-A90A-84B7693E27FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C2E728-E8F2-461D-A069-4BEC88B94FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6B13D4-07F3-4CB5-8194-89781E685A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454BC21-A04F-4B3D-8533-2414B6E1BC8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5973A534-F961-4A97-B20E-994BA28AFE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40745A01-E5AC-4207-A34F-D8E7F7231F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5811970-FE82-4888-A01D-B356B5578296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"939C73D9-E0E9-47A5-970E-6C84F5ECD2D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4AF711-D921-4261-A459-2A0780EA951F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA5CF67-A58B-4666-B87E-712507233453\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2377CD30-6F57-46CB-9DD1-E29458A7D928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886E9D1F-25FA-41FA-A64B-E42B9910D2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7DB9D3-BB34-49BE-8302-A054D79FE8D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78DAB13-32AA-4813-AB0A-0EA870F41183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…