Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-42x3-933p-vr75
Vulnerability from github
Backup feature of SIP module in Huawei DP300 V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; RSE6500 V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC300T; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00T; TE30 V100R001C10; V100R001C10SPC100; V100R001C10SPC200B010; V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V100R001C10SPC800; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE60 V100R001C01SPC100; V100R001C01SPC107TB010; V100R001C10; V100R001C10SPC300; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800; V100R001C10SPC900; V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300; TP3106 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C00SPC800; TP3206 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C10; ViewPoint 9030 V100R011C02SPC100; V100R011C03B012SP15; V100R011C03B012SP16; V100R011C03B015SP03; V100R011C03LGWL01SPC100; V100R011C03SPC100; V100R011C03SPC200; V100R011C03SPC300; V100R011C03SPC400; V100R011C03SPC500; eSpace U1960 V200R003C30SPC200; eSpace U1981 V100R001C20SPC700; V200R003C20SPCa00 has an overflow vulnerability when the module process a specific amount of state. The module cannot handle it causing SIP module DoS.
{ affected: [], aliases: [ "CVE-2017-17144", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-03-05T19:29:00Z", severity: "MODERATE", }, details: "Backup feature of SIP module in Huawei DP300 V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; RSE6500 V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC300T; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00T; TE30 V100R001C10; V100R001C10SPC100; V100R001C10SPC200B010; V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V100R001C10SPC800; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE60 V100R001C01SPC100; V100R001C01SPC107TB010; V100R001C10; V100R001C10SPC300; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800; V100R001C10SPC900; V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300; TP3106 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C00SPC800; TP3206 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C10; ViewPoint 9030 V100R011C02SPC100; V100R011C03B012SP15; V100R011C03B012SP16; V100R011C03B015SP03; V100R011C03LGWL01SPC100; V100R011C03SPC100; V100R011C03SPC200; V100R011C03SPC300; V100R011C03SPC400; V100R011C03SPC500; eSpace U1960 V200R003C30SPC200; eSpace U1981 V100R001C20SPC700; V200R003C20SPCa00 has an overflow vulnerability when the module process a specific amount of state. The module cannot handle it causing SIP module DoS.", id: "GHSA-42x3-933p-vr75", modified: "2022-05-14T03:34:14Z", published: "2022-05-14T03:34:14Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-17144", }, { type: "WEB", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", type: "CVSS_V3", }, ], }
cve-2017-17144
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | DP300; RP200; RSE6500; TE30; TE40; TE50; TE60; TP3106; TP3206; ViewPoint 9030; eSpace U1960; eSpace U1981 |
Version: DP300 V500R002C00 Version: V500R002C00SPC100 Version: V500R002C00SPC200 Version: V500R002C00SPC300 Version: V500R002C00SPC400 Version: V500R002C00SPC500 Version: V500R002C00SPC600 Version: V500R002C00SPC800 Version: V500R002C00SPC900 Version: V500R002C00SPCa00 Version: RP200 V500R002C00SPC200 Version: V600R006C00 Version: V600R006C00SPC200 Version: RSE6500 V500R002C00SPC100 Version: V500R002C00SPC300T Version: V500R002C00SPC700 Version: V500R002C00T Version: TE30 V100R001C10 Version: V100R001C10SPC100 Version: V100R001C10SPC200B010 Version: V100R001C10SPC300 Version: V100R001C10SPC500 Version: V100R001C10SPC600 Version: V100R001C10SPC700B010 Version: V100R001C10SPC800 Version: V500R002C00SPCb00 Version: TE40 V500R002C00SPC600 Version: TE50 V500R002C00SPC600 Version: TE60 V100R001C01SPC100 Version: V100R001C01SPC107TB010 Version: V100R001C10 Version: V100R001C10SPC400 Version: V100R001C10SPC700 Version: V100R001C10SPC900 Version: V500R002C00 Version: V500R002C00SPCd00 Version: V600R006C00SPC100 Version: V600R006C00SPC300 Version: TP3106 V100R002C00 Version: V100R002C00SPC200 Version: V100R002C00SPC400 Version: V100R002C00SPC600 Version: V100R002C00SPC700 Version: V100R002C00SPC800 Version: TP3206 V100R002C00 Version: V100R002C10 Version: ViewPoint 9030 V100R011C02SPC100 Version: V100R011C03B012SP15 Version: V100R011C03B012SP16 Version: V100R011C03B015SP03 Version: V100R011C03LGWL01SPC100 Version: V100R011C03SPC100 Version: V100R011C03SPC200 Version: V100R011C03SPC300 Version: V100R011C03SPC400 Version: V100R011C03SPC500 Version: eSpace U1960 V200R003C30SPC200 Version: eSpace U1981 V100R001C20SPC700 Version: V200R003C20SPCa00 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.849Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300; RP200; RSE6500; TE30; TE40; TE50; TE60; TP3106; TP3206; ViewPoint 9030; eSpace U1960; eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC400", }, { status: "affected", version: "V500R002C00SPC500", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "RP200 V500R002C00SPC200", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, { status: "affected", version: "RSE6500 V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC300T", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00T", }, { status: "affected", version: "TE30 V100R001C10", }, { status: "affected", version: "V100R001C10SPC100", }, { status: "affected", version: "V100R001C10SPC200B010", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC700B010", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "TE40 V500R002C00SPC600", }, { status: "affected", version: "TE50 V500R002C00SPC600", }, { status: "affected", version: "TE60 V100R001C01SPC100", }, { status: "affected", version: "V100R001C01SPC107TB010", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC700", }, { status: "affected", version: "V100R001C10SPC900", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPCd00", }, { status: "affected", version: "V600R006C00SPC100", }, { status: "affected", version: "V600R006C00SPC300", }, { status: "affected", version: "TP3106 V100R002C00", }, { status: "affected", version: "V100R002C00SPC200", }, { status: "affected", version: "V100R002C00SPC400", }, { status: "affected", version: "V100R002C00SPC600", }, { status: "affected", version: "V100R002C00SPC700", }, { status: "affected", version: "V100R002C00SPC800", }, { status: "affected", version: "TP3206 V100R002C00", }, { status: "affected", version: "V100R002C10", }, { status: "affected", version: "ViewPoint 9030 V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, { status: "affected", version: "eSpace U1960 V200R003C30SPC200", }, { status: "affected", version: "eSpace U1981 V100R001C20SPC700", }, { status: "affected", version: "V200R003C20SPCa00", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "Backup feature of SIP module in Huawei DP300 V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; RSE6500 V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC300T; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00T; TE30 V100R001C10; V100R001C10SPC100; V100R001C10SPC200B010; V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V100R001C10SPC800; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE60 V100R001C01SPC100; V100R001C01SPC107TB010; V100R001C10; V100R001C10SPC300; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800; V100R001C10SPC900; V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300; TP3106 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C00SPC800; TP3206 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C10; ViewPoint 9030 V100R011C02SPC100; V100R011C03B012SP15; V100R011C03B012SP16; V100R011C03B015SP03; V100R011C03LGWL01SPC100; V100R011C03SPC100; V100R011C03SPC200; V100R011C03SPC300; V100R011C03SPC400; V100R011C03SPC500; eSpace U1960 V200R003C30SPC200; eSpace U1981 V100R001C20SPC700; V200R003C20SPCa00 has an overflow vulnerability when the module process a specific amount of state. The module cannot handle it causing SIP module DoS.", }, ], problemTypes: [ { descriptions: [ { description: "overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-05T18:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-12-06T00:00:00", ID: "CVE-2017-17144", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300; RP200; RSE6500; TE30; TE40; TE50; TE60; TP3106; TP3206; ViewPoint 9030; eSpace U1960; eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC400", }, { version_value: "V500R002C00SPC500", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "RP200 V500R002C00SPC200", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, { version_value: "RSE6500 V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC300T", }, { version_value: "V500R002C00SPC500", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00T", }, { version_value: "TE30 V100R001C10", }, { version_value: "V100R001C10SPC100", }, { version_value: "V100R001C10SPC200B010", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC700B010", }, { version_value: "V100R001C10SPC800", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC500", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "TE40 V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, { version_value: "TE50 V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, { version_value: "TE60 V100R001C01SPC100", }, { version_value: "V100R001C01SPC107TB010", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC700", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R001C10SPC900", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V500R002C00SPCd00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC100", }, { version_value: "V600R006C00SPC200", }, { version_value: "V600R006C00SPC300", }, { version_value: "TP3106 V100R002C00", }, { version_value: "V100R002C00SPC200", }, { version_value: "V100R002C00SPC400", }, { version_value: "V100R002C00SPC600", }, { version_value: "V100R002C00SPC700", }, { version_value: "V100R002C00SPC800", }, { version_value: "TP3206 V100R002C00", }, { version_value: "V100R002C00SPC200", }, { version_value: "V100R002C00SPC400", }, { version_value: "V100R002C00SPC600", }, { version_value: "V100R002C00SPC700", }, { version_value: "V100R002C10", }, { version_value: "ViewPoint 9030 V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, { version_value: "eSpace U1960 V200R003C30SPC200", }, { version_value: "eSpace U1981 V100R001C20SPC700", }, { version_value: "V200R003C20SPCa00", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Backup feature of SIP module in Huawei DP300 V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC400; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; RP200 V500R002C00SPC200; V600R006C00; V600R006C00SPC200; RSE6500 V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC300T; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00T; TE30 V100R001C10; V100R001C10SPC100; V100R001C10SPC200B010; V100R001C10SPC300; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700B010; V100R001C10SPC800; V500R002C00SPC200; V500R002C00SPC500; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; TE40 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC900; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE50 V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPCb00; V600R006C00; V600R006C00SPC200; TE60 V100R001C01SPC100; V100R001C01SPC107TB010; V100R001C10; V100R001C10SPC300; V100R001C10SPC400; V100R001C10SPC500; V100R001C10SPC600; V100R001C10SPC700; V100R001C10SPC800; V100R001C10SPC900; V500R002C00; V500R002C00SPC100; V500R002C00SPC200; V500R002C00SPC300; V500R002C00SPC600; V500R002C00SPC700; V500R002C00SPC800; V500R002C00SPC900; V500R002C00SPCa00; V500R002C00SPCb00; V500R002C00SPCd00; V600R006C00; V600R006C00SPC100; V600R006C00SPC200; V600R006C00SPC300; TP3106 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C00SPC800; TP3206 V100R002C00; V100R002C00SPC200; V100R002C00SPC400; V100R002C00SPC600; V100R002C00SPC700; V100R002C10; ViewPoint 9030 V100R011C02SPC100; V100R011C03B012SP15; V100R011C03B012SP16; V100R011C03B015SP03; V100R011C03LGWL01SPC100; V100R011C03SPC100; V100R011C03SPC200; V100R011C03SPC300; V100R011C03SPC400; V100R011C03SPC500; eSpace U1960 V200R003C30SPC200; eSpace U1981 V100R001C20SPC700; V200R003C20SPCa00 has an overflow vulnerability when the module process a specific amount of state. The module cannot handle it causing SIP module DoS.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17144", datePublished: "2018-03-05T19:00:00Z", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-09-17T02:16:51.319Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.