Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Huawei Data Communication: Buffer Overflow Vulnerability in Some Huawei Products (huawei-sa-20171213-01-buffer)

Information

Severity

Severity

Medium

Family

Family

Huawei

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products.

Insight

Insight

There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal. (Vulnerability ID: HWPSIRT-2017-04072)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-15350.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.

Affected Software

Affected Software

DP300 versions V500R002C00 IPS Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R001C30 V500R001C50 NGFW Module versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30 V500R001C00 V500R001C20 V500R002C00 V500R002C10 NIP6300 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6600 versions V500R001C00 V500R001C20 V500R001C30 V500R001C50 NIP6800 versions V500R001C50 RP200 versions V500R002C00SPC200 V600R006C00 SeMG9811 versions V300R001C01SPC500 Secospace USG6300 versions V100R001C10SPC200 V100R001C20SPC002T V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6500 versions V100R001C10SPC200 V100R001C20SPC100 V100R001C30B018 V500R001C00 V500R001C20 V500R001C30 V500R001C50 Secospace USG6600 versions V100R001C00SPC200 V100R001C20SPC070B710 V100R001C30 V500R001C00 V500R001C00 V500R001C20 V500R001C20 V500R001C30 V500R001C30 V500R001C50 V500R001C50 TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00 TE40 versions V500R002C00SPC600 V600R006C00 TE50 versions V500R002C00SPC600 V600R006C00 TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00 TP3206 versions V100R002C00 V100R002C10 USG9500 versions V500R001C00 V500R001C30 V500R001C30SPC109T V500R001C30SPC115T V500R001C30SPC117T V500R001C30SPC122T V500R001C30SPC123T V500R001C30SPC211T V500R001C30SPC215T V500R001C50 V500R001C50SPC005T V500R001C50SPC020T V500R001C50SPC030T

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

See the referenced vendor advisory for a solution.

Common Vulnerabilities and Exposures (CVE)