cnvd-2017-37844
Vulnerability from cnvd

Title: 多款Huawei路由器产品数值计算错误漏洞

Description:

Huawei S12700等都是中国华为(Huawei)公司的智能路由交换机。

多款Huawei路由器产品中存在数值计算错误漏洞,该漏洞源于程序未能充分的校验报文。攻击者可通过向受影响设备发送带有keychain认证选项的特殊TCP报文利用该漏洞造成受影响设备复位。

Severity:

Patch Name: 多款Huawei路由器产品数值计算错误漏洞 的补丁

Patch Description:

Huawei S12700等都是中国华为(Huawei)公司的智能路由交换机。

多款Huawei路由器产品中存在数值计算错误漏洞,该漏洞源于程序未能充分的校验报文。攻击者可通过向受影响设备发送带有keychain认证选项的特殊TCP报文利用该漏洞造成受影响设备复位。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171215-01-router-cn

Reference: http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171215-01-router-cn

Impacted products
Name
['Huawei S7700 V200R008C00', 'Huawei S9700 V200R008C00', 'Huawei S12700 V200R008C00', 'Huawei S6700 V200R008C00', 'Huawei S5700 V200R008C00', 'Huawei S5700 V200R007C00', 'Huawei S5700 V200R009C00', 'Huawei S6700 V200R009C00', 'Huawei S7700 V200R009C00', 'Huawei S12700 V200R009C00', 'Huawei S9700 V200R009C00']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-17300"
    }
  },
  "description": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u667a\u80fd\u8def\u7531\u4ea4\u6362\u673a\u3002\r\n\r\n\u591a\u6b3eHuawei\u8def\u7531\u5668\u4ea7\u54c1\u4e2d\u5b58\u5728\u6570\u503c\u8ba1\u7b97\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u7684\u6821\u9a8c\u62a5\u6587\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u53d7\u5f71\u54cd\u8bbe\u5907\u53d1\u9001\u5e26\u6709keychain\u8ba4\u8bc1\u9009\u9879\u7684\u7279\u6b8aTCP\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u53d7\u5f71\u54cd\u8bbe\u5907\u590d\u4f4d\u3002",
  "discovererName": "Huawei",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171215-01-router-cn",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-37844",
  "openTime": "2017-12-22",
  "patchDescription": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u667a\u80fd\u8def\u7531\u4ea4\u6362\u673a\u3002\r\n\r\n\u591a\u6b3eHuawei\u8def\u7531\u5668\u4ea7\u54c1\u4e2d\u5b58\u5728\u6570\u503c\u8ba1\u7b97\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u7684\u6821\u9a8c\u62a5\u6587\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u53d7\u5f71\u54cd\u8bbe\u5907\u53d1\u9001\u5e26\u6709keychain\u8ba4\u8bc1\u9009\u9879\u7684\u7279\u6b8aTCP\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u53d7\u5f71\u54cd\u8bbe\u5907\u590d\u4f4d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei\u8def\u7531\u5668\u4ea7\u54c1\u6570\u503c\u8ba1\u7b97\u9519\u8bef\u6f0f\u6d1e \u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei S7700  V200R008C00",
      "Huawei S9700  V200R008C00",
      "Huawei S12700  V200R008C00",
      "Huawei S6700  V200R008C00",
      "Huawei S5700  V200R008C00",
      "Huawei S5700 V200R007C00",
      "Huawei S5700 V200R009C00",
      "Huawei S6700 V200R009C00",
      "Huawei S7700 V200R009C00",
      "Huawei S12700 V200R009C00",
      "Huawei S9700 V200R009C00"
    ]
  },
  "referenceLink": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171215-01-router-cn",
  "serverity": "\u9ad8",
  "submitTime": "2017-12-19",
  "title": "\u591a\u6b3eHuawei\u8def\u7531\u5668\u4ea7\u54c1\u6570\u503c\u8ba1\u7b97\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…