Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Huawei Data Communication: Buffer Overflow Vulnerability in Some Huawei Products (huawei-sa-20171213-01-buffer)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products.
Insight
Insight
There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal. (Vulnerability ID: HWPSIRT-2017-04072)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-15350.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.
Affected Software
Affected Software
DP300 versions V500R002C00 IPS Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 NGFW Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10 NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6800 versions V500R001C50 RP200 versions V500R002C00SPC200 V600R006C00 SeMG9811 versions V300R001C01SPC500 Secospace USG6300 versions V100R001C10SPC200 V100R001C20SPC002T V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6500 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6600 versions V100R001C00SPC200 V100R001C20SPC070B710 V100R001C30 V500R001C00 V500R001C00 V500R001C20 V500R001C20 V500R001C30 V500R001C30 V500R001C50 V500R001C50 TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00 TE40 versions V500R002C00SPC600 V600R006C00 TE50 versions V500R002C00SPC600 V600R006C00 TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00 TP3206 versions V100R002C00 V100R002C10 USG9500 versions V500R001C00 V500R001C30 V500R001C30SPC109T V500R001C30SPC115T V500R001C30SPC117T V500R001C30SPC122T V500R001C30SPC123T V500R001C30SPC211T V500R001C30SPC215T V500R001C50 V500R001C50SPC005T V500R001C50SPC020T V500R001C50SPC030T
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
See the referenced vendor advisory for a solution.