cnvd-2017-37496
Vulnerability from cnvd
Title: 多款Huawei产品资源耗尽漏洞
Description:
Huawei Secospace USG系列都是华为面向企业、IDC、校园网和运营商等客户推出的新一代专业入侵防御和防火墙产品;DP300及TP3206均是一款面向高端客户的一体化桌面智真;HUAWEI VP9660是华为公司以客户需求为导向,结合强大的网络设备制造优势,开发出的新一代业界最大容量、可灵活分配端口、平滑扩容的全适配MCU,是具有1080p60全编全解超强处理能力的多媒体交换平台。
多款Huawei产品存在资源耗尽漏洞,该漏洞是由于设备未能对H.323报文中某些字段进行正确处理。未经身份认证的远程攻击者通过向设备发送精心构造的H.323报文,成功利用该漏洞导致系统中栈内存资源耗尽,某些服务异常。
Severity: 中
Patch Name: 多款Huawei产品资源耗尽漏洞的补丁
Patch Description:
Huawei Secospace USG系列都是华为面向企业、IDC、校园网和运营商等客户推出的新一代专业入侵防御和防火墙产品;DP300及TP3206均是一款面向高端客户的一体化桌面智真;HUAWEI VP9660是华为公司以客户需求为导向,结合强大的网络设备制造优势,开发出的新一代业界最大容量、可灵活分配端口、平滑扩容的全适配MCU,是具有1080p60全编全解超强处理能力的多媒体交换平台。
多款Huawei产品存在资源耗尽漏洞,该漏洞是由于设备未能对H.323报文中某些字段进行正确处理。未经身份认证的远程攻击者通过向设备发送精心构造的H.323报文,成功利用该漏洞导致系统中栈内存资源耗尽,某些服务异常。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn
Reference: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn
Name | ['Huawei Secospace USG6500 V500R001C00', 'Huawei Secospace USG6600 V500R001C00', 'Huawei DP300 V500R002C00', 'Huawei TP3206 V100R002C00', 'Huawei VP9660 V500R002C00', 'Huawei VP9660 V500R002C10', 'Huawei Secospace USG6300 V500R001C00', 'Huawei Secospace USG6300 V500R001C20', 'Huawei Secospace USG6300 V500R001C30', 'Huawei Secospace USG6300 V500R001C50', 'Huawei Secospace USG6500 V500R001C20', 'Huawei Secospace USG6500 V500R001C30', 'Huawei Secospace USG6500 V500R001C50', 'Huawei Secospace USG6600 V500R001C20', 'Huawei Secospace USG6600 V500R001C30', 'Huawei Secospace USG6600 V500R001C50'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-17166" } }, "description": "Huawei Secospace USG\u7cfb\u5217\u90fd\u662f\u534e\u4e3a\u9762\u5411\u4f01\u4e1a\u3001IDC\u3001\u6821\u56ed\u7f51\u548c\u8fd0\u8425\u5546\u7b49\u5ba2\u6237\u63a8\u51fa\u7684\u65b0\u4e00\u4ee3\u4e13\u4e1a\u5165\u4fb5\u9632\u5fa1\u548c\u9632\u706b\u5899\u4ea7\u54c1\uff1bDP300\u53caTP3206\u5747\u662f\u4e00\u6b3e\u9762\u5411\u9ad8\u7aef\u5ba2\u6237\u7684\u4e00\u4f53\u5316\u684c\u9762\u667a\u771f\uff1bHUAWEI VP9660\u662f\u534e\u4e3a\u516c\u53f8\u4ee5\u5ba2\u6237\u9700\u6c42\u4e3a\u5bfc\u5411\uff0c\u7ed3\u5408\u5f3a\u5927\u7684\u7f51\u7edc\u8bbe\u5907\u5236\u9020\u4f18\u52bf\uff0c\u5f00\u53d1\u51fa\u7684\u65b0\u4e00\u4ee3\u4e1a\u754c\u6700\u5927\u5bb9\u91cf\u3001\u53ef\u7075\u6d3b\u5206\u914d\u7aef\u53e3\u3001\u5e73\u6ed1\u6269\u5bb9\u7684\u5168\u9002\u914dMCU\uff0c\u662f\u5177\u67091080p60\u5168\u7f16\u5168\u89e3\u8d85\u5f3a\u5904\u7406\u80fd\u529b\u7684\u591a\u5a92\u4f53\u4ea4\u6362\u5e73\u53f0\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u8bbe\u5907\u672a\u80fd\u5bf9H.323\u62a5\u6587\u4e2d\u67d0\u4e9b\u5b57\u6bb5\u8fdb\u884c\u6b63\u786e\u5904\u7406\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u5411\u8bbe\u5907\u53d1\u9001\u7cbe\u5fc3\u6784\u9020\u7684H.323\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u4e2d\u6808\u5185\u5b58\u8d44\u6e90\u8017\u5c3d\uff0c\u67d0\u4e9b\u670d\u52a1\u5f02\u5e38\u3002", "discovererName": "Huawei", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-37496", "openTime": "2017-12-19", "patchDescription": "Huawei Secospace USG\u7cfb\u5217\u90fd\u662f\u534e\u4e3a\u9762\u5411\u4f01\u4e1a\u3001IDC\u3001\u6821\u56ed\u7f51\u548c\u8fd0\u8425\u5546\u7b49\u5ba2\u6237\u63a8\u51fa\u7684\u65b0\u4e00\u4ee3\u4e13\u4e1a\u5165\u4fb5\u9632\u5fa1\u548c\u9632\u706b\u5899\u4ea7\u54c1\uff1bDP300\u53caTP3206\u5747\u662f\u4e00\u6b3e\u9762\u5411\u9ad8\u7aef\u5ba2\u6237\u7684\u4e00\u4f53\u5316\u684c\u9762\u667a\u771f\uff1bHUAWEI VP9660\u662f\u534e\u4e3a\u516c\u53f8\u4ee5\u5ba2\u6237\u9700\u6c42\u4e3a\u5bfc\u5411\uff0c\u7ed3\u5408\u5f3a\u5927\u7684\u7f51\u7edc\u8bbe\u5907\u5236\u9020\u4f18\u52bf\uff0c\u5f00\u53d1\u51fa\u7684\u65b0\u4e00\u4ee3\u4e1a\u754c\u6700\u5927\u5bb9\u91cf\u3001\u53ef\u7075\u6d3b\u5206\u914d\u7aef\u53e3\u3001\u5e73\u6ed1\u6269\u5bb9\u7684\u5168\u9002\u914dMCU\uff0c\u662f\u5177\u67091080p60\u5168\u7f16\u5168\u89e3\u8d85\u5f3a\u5904\u7406\u80fd\u529b\u7684\u591a\u5a92\u4f53\u4ea4\u6362\u5e73\u53f0\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u8bbe\u5907\u672a\u80fd\u5bf9H.323\u62a5\u6587\u4e2d\u67d0\u4e9b\u5b57\u6bb5\u8fdb\u884c\u6b63\u786e\u5904\u7406\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u5411\u8bbe\u5907\u53d1\u9001\u7cbe\u5fc3\u6784\u9020\u7684H.323\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u4e2d\u6808\u5185\u5b58\u8d44\u6e90\u8017\u5c3d\uff0c\u67d0\u4e9b\u670d\u52a1\u5f02\u5e38\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Huawei Secospace USG6500 V500R001C00", "Huawei Secospace USG6600 V500R001C00", "Huawei DP300 V500R002C00", "Huawei TP3206 V100R002C00", "Huawei VP9660 V500R002C00", "Huawei VP9660 V500R002C10", "Huawei Secospace USG6300 V500R001C00", "Huawei Secospace USG6300 V500R001C20", "Huawei Secospace USG6300 V500R001C30", "Huawei Secospace USG6300 V500R001C50", "Huawei Secospace USG6500 V500R001C20", "Huawei Secospace USG6500 V500R001C30", "Huawei Secospace USG6500 V500R001C50", "Huawei Secospace USG6600 V500R001C20", "Huawei Secospace USG6600 V500R001C30", "Huawei Secospace USG6600 V500R001C50" ] }, "referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-cn", "serverity": "\u4e2d", "submitTime": "2017-12-18", "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u8d44\u6e90\u8017\u5c3d\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.