var-201802-0530
Vulnerability from variot
Huawei CloudEngine 12800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 5800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 6800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 7800 V100R003C00, V100R005C00, V100R005C10, V100R006C00 have a memory leak vulnerability. An unauthenticated attacker may send specific Resource ReServation Protocol (RSVP) packets to the affected products. Due to not release the memory to handle the packets, successful exploit will result in memory leak of the affected products and lead to a DoS condition. Huawei CloudEngine Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei CloudEngine12800 and other Huawei Huayun (Cloud) series of switch products. The vulnerability stems from the fact that the program does not release the memory for processing the message. The following products and versions are affected: Huawei CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 7800 V100R003C00, V100R005C00, V100R005C10, and V100R006C00
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0530", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cloudengine 5800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r005c10" }, { "model": "cloudengine 5800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r006c00" }, { "model": "cloudengine 6800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r003c00" }, { "model": "cloudengine 6800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r005c00" }, { "model": "cloudengine 6800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r005c10" }, { "model": "cloudengine 6800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r006c00" }, { "model": "cloudengine 7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r003c00" }, { "model": "cloudengine 7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r005c00" }, { "model": "cloudengine 7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r005c10" }, { "model": "cloudengine 7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r006c00" }, { "model": "cloudengine 12800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "cloudengine 12800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005c00" }, { "model": "cloudengine 12800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005c10" }, { "model": "cloudengine 12800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r006c00" }, { "model": "cloudengine 5800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r003c00" }, { "model": "cloudengine 5800", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "v100r005c00" }, { "model": "cloudengine v100r003c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "12800" }, { "model": "cloudengine v100r005c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "12800" }, { "model": "cloudengine v100r005c10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "12800" }, { "model": "cloudengine v100r006c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "12800" }, { "model": "cloudengine v100r005c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "5800" }, { "model": "cloudengine v100r005c10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "5800" }, { "model": "cloudengine v100r006c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "5800" }, { "model": "cloudengine v100r005c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6800" }, { "model": "cloudengine v100r005c10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6800" }, { "model": "cloudengine v100r006c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6800" }, { "model": "cloudengine v100r005c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "7800" }, { "model": "cloudengine v100r005c10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "7800" }, { "model": "cloudengine v100r006c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "7800" }, { "model": "cloudengine v100r003c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "5800" }, { "model": "cloudengine v100r003c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "6800" }, { "model": "cloudengine v100r003c00", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "7800" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:huawei:cloudengine_12800_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cloudengine_5800_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cloudengine_6800_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cloudengine_7800_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012437" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei internal tester", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-062" } ], "trust": 0.6 }, "cve": "CVE-2017-15349", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2017-15349", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-38221", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-106162", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2017-15349", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-15349", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-15349", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-38221", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201712-062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-106162", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei CloudEngine 12800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 5800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 6800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 7800 V100R003C00, V100R005C00, V100R005C10, V100R006C00 have a memory leak vulnerability. An unauthenticated attacker may send specific Resource ReServation Protocol (RSVP) packets to the affected products. Due to not release the memory to handle the packets, successful exploit will result in memory leak of the affected products and lead to a DoS condition. Huawei CloudEngine Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei CloudEngine12800 and other Huawei Huayun (Cloud) series of switch products. The vulnerability stems from the fact that the program does not release the memory for processing the message. The following products and versions are affected: Huawei CloudEngine 12800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 5800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 6800 V100R003C00 Version, V100R005C00 Version, V100R005C10 Version, V100R006C00 Version; CloudEngine 7800 V100R003C00, V100R005C00, V100R005C10, and V100R006C00", "sources": [ { "db": "NVD", "id": "CVE-2017-15349" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-15349", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2017-012437", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-062", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-38221", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-106162", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "id": "VAR-201802-0530", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" } ], "trust": 1.4907738099999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" } ] }, "last_update_date": "2024-11-23T21:53:23.232000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20171201-01-router", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-router-en" }, { "title": "Patch of Huawei\u0027s various product memory leak vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/111811" }, { "title": "Multiple Huawei Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76890" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-106162" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-router-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15349" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15349" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-router-cn" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-38221" }, { "db": "VULHUB", "id": "VHN-106162" }, { "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "db": "CNNVD", "id": "CNNVD-201712-062" }, { "db": "NVD", "id": "CVE-2017-15349" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38221" }, { "date": "2018-02-15T00:00:00", "db": "VULHUB", "id": "VHN-106162" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "date": "2017-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-062" }, { "date": "2018-02-15T16:29:01.203000", "db": "NVD", "id": "CVE-2017-15349" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2017-38221" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-106162" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012437" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-062" }, { "date": "2024-11-21T03:14:31.227000", "db": "NVD", "id": "CVE-2017-15349" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei CloudEngine Resource management vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012437" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-062" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.