cnvd-2016-02290
Vulnerability from cnvd
Title: 多款Huawei产品交换机ICMPv6数据包内存泄露漏洞
Description:
Huawei S5300EI是中国华为的S系列交换机产品。
Huawei S5300EI处理ICMPv6数据包存在内存泄露漏洞,允许远程攻击者利用漏洞提交特殊请求进行拒绝服务攻击。
Severity: 中
Patch Name: 多款Huawei产品交换机ICMPv6数据包内存泄露漏洞的补丁
Patch Description:
Huawei S5300EI是中国华为的S系列交换机产品。
Huawei S5300EI处理ICMPv6数据包存在内存泄露漏洞,允许远程攻击者利用漏洞提交特殊请求进行拒绝服务攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en
Reference: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en
Impacted products
Name | ['Huawei S5300EI V200R003C00', 'Huawei S5300EI V200R005C00', 'Huawei S5300SI V200R003C00', 'Huawei S5300SI V200R005C00', 'Huawei S5310HI 200R003C00', 'Huawei S5310HI 200R005C00', 'Huawei S6300EI 200R003C00', 'Huawei S6300EI 200R005C00', 'Huawei S2350EI 200R003C00', 'Huawei S2350EI 200R005C00', 'Huawei S2350EI 200R006C00', 'Huawei S5300LI 200R003C00', 'Huawei S5300LI 200R005C00', 'Huawei S5300LI 200R006C00', 'Huawei S9300 200R003C00', 'Huawei S9300 200R005C00', 'Huawei S9300 200R006C00', 'Huawei S7700 200R003C00', 'Huawei S7700 200R005C00', 'Huawei S7700 200R006C00', 'Huawei S9700 200R003C00', 'Huawei S9700 200R005C00', 'Huawei S9700 200R006C00', 'Huawei S5720HI 200R006C00', 'Huawei S5720EI 200R006C00', 'Huawei S2300 100R006C05', 'Huawei S3300 100R006C05'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-8676" } }, "description": "Huawei S5300EI\u662f\u4e2d\u56fd\u534e\u4e3a\u7684S\u7cfb\u5217\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\nHuawei S5300EI\u5904\u7406ICMPv6\u6570\u636e\u5305\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002", "discovererName": "Huawei", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-02290", "openTime": "2016-04-19", "patchDescription": "Huawei S5300EI\u662f\u4e2d\u56fd\u534e\u4e3a\u7684S\u7cfb\u5217\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\nHuawei S5300EI\u5904\u7406ICMPv6\u6570\u636e\u5305\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4ea4\u6362\u673aICMPv6\u6570\u636e\u5305\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Huawei S5300EI V200R003C00", "Huawei S5300EI V200R005C00", "Huawei S5300SI V200R003C00", "Huawei S5300SI V200R005C00", "Huawei S5310HI 200R003C00", "Huawei S5310HI 200R005C00", "Huawei S6300EI 200R003C00", "Huawei S6300EI 200R005C00", "Huawei S2350EI 200R003C00", "Huawei S2350EI 200R005C00", "Huawei S2350EI 200R006C00", "Huawei S5300LI 200R003C00", "Huawei S5300LI 200R005C00", "Huawei S5300LI 200R006C00", "Huawei S9300 200R003C00", "Huawei S9300 200R005C00", "Huawei S9300 200R006C00", "Huawei S7700 200R003C00", "Huawei S7700 200R005C00", "Huawei S7700 200R006C00", "Huawei S9700 200R003C00", "Huawei S9700 200R005C00", "Huawei S9700 200R006C00", "Huawei S5720HI 200R006C00", "Huawei S5720EI 200R006C00", "Huawei S2300 100R006C05", "Huawei S3300 100R006C05" ] }, "referenceLink": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en", "serverity": "\u4e2d", "submitTime": "2016-04-16", "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4ea4\u6362\u673aICMPv6\u6570\u636e\u5305\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…