cnvd-2016-11302
Vulnerability from cnvd

Title: 多款华为产品存在内存泄露漏洞

Description:

Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。

多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。

Severity:

Patch Name: 多款华为产品存在内存泄露漏洞的补丁

Patch Description:

Huawei AR3200是华为路由器设备,S12700、S5300、S5700、S6300、S6700、S7700、S9300、S9700是华为交换机设备。

多款华为产品存在内存泄露漏洞。由于设备的Multiprotocol Label Switching(MPLS)报文处理模块在处理异常报文时会重复申请内存,存在持续的攻击导致内存耗尽的风险。攻击者可以利用这个漏洞导致设备内存耗尽。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

厂商已提供漏洞修补方案,请关注如下链接及时更新: http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn

Reference: http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn

Impacted products
Name
['Huawei AR3200 V200R007C00', 'Huawei AR3200 V200R005C32', 'Huawei AR3200 V200R005C20', 'Huawei S7700 V200R006C00', 'Huawei S7700 V200R008C00', 'Huawei S9700 V200R006C00', 'Huawei S9700 V200R008C00', 'Huawei S12700 V200R008C00', 'Huawei S6700 V200R008C00', 'Huawei S6300 V200R008C00', 'Huawei S5700 V200R006C00', 'Huawei S5700 V200R008C00', 'Huawei S5300 V200R006C00', 'Huawei S5300 V200R007C00', 'Huawei S5300 V200R008C00', 'Huawei S9300 V200R006C00', 'Huawei S9300 V200R008C00', 'Huawei S12700 V200R007C00', 'Huawei S5700 V200R007C00', 'Huawei S6300 V200R007C00', 'Huawei S6700 V200R007C00', 'Huawei S7700 V200R007C00', 'Huawei S9300 V200R007C00', 'Huawei S9700 V200R007C00']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-8797"
    }
  },
  "description": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002",
  "discovererName": "\u534e\u4e3a",
  "formalWay": "\u5382\u5546\u5df2\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u8865\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5982\u4e0b\u94fe\u63a5\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-11302",
  "openTime": "2016-11-18",
  "patchDescription": "Huawei AR3200\u662f\u534e\u4e3a\u8def\u7531\u5668\u8bbe\u5907\uff0cS12700\u3001S5300\u3001S5700\u3001S6300\u3001S6700\u3001S7700\u3001S9300\u3001S9700\u662f\u534e\u4e3a\u4ea4\u6362\u673a\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u3002\u7531\u4e8e\u8bbe\u5907\u7684Multiprotocol Label Switching\uff08MPLS\uff09\u62a5\u6587\u5904\u7406\u6a21\u5757\u5728\u5904\u7406\u5f02\u5e38\u62a5\u6587\u65f6\u4f1a\u91cd\u590d\u7533\u8bf7\u5185\u5b58\uff0c\u5b58\u5728\u6301\u7eed\u7684\u653b\u51fb\u5bfc\u81f4\u5185\u5b58\u8017\u5c3d\u7684\u98ce\u9669\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u8bbe\u5907\u5185\u5b58\u8017\u5c3d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei AR3200 V200R007C00",
      "Huawei AR3200 V200R005C32",
      "Huawei AR3200 V200R005C20",
      "Huawei S7700  V200R006C00",
      "Huawei S7700  V200R008C00",
      "Huawei S9700  V200R006C00",
      "Huawei S9700  V200R008C00",
      "Huawei S12700  V200R008C00",
      "Huawei S6700  V200R008C00",
      "Huawei S6300  V200R008C00",
      "Huawei S5700  V200R006C00",
      "Huawei S5700  V200R008C00",
      "Huawei S5300  V200R006C00",
      "Huawei S5300  V200R007C00",
      "Huawei S5300  V200R008C00",
      "Huawei S9300  V200R006C00",
      "Huawei S9300  V200R008C00",
      "Huawei S12700 V200R007C00",
      "Huawei S5700 V200R007C00",
      "Huawei S6300 V200R007C00",
      "Huawei S6700 V200R007C00",
      "Huawei S7700 V200R007C00",
      "Huawei S9300 V200R007C00",
      "Huawei S9700 V200R007C00"
    ]
  },
  "referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-cn",
  "serverity": "\u4e2d",
  "submitTime": "2016-11-18",
  "title": "\u591a\u6b3e\u534e\u4e3a\u4ea7\u54c1\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…