cnvd-2019-25515
Vulnerability from cnvd
Title: 多款Huawei S系列交换机输入验证错误漏洞
Description:
Huawei S12700等都是中国华为(Huawei)公司的一款企业级交换机产品。
多款Huawei S系列交换机存在输入验证错误漏洞,该漏洞源于程序对Http报文特定参数的校验不充分。远程攻击者可通过发送构造的报文利用该漏洞导致交换机重启,造成拒绝服务。
Severity: 高
Patch Name: 多款Huawei S系列交换机输入验证错误漏洞的补丁
Patch Description:
Huawei S12700等都是中国华为(Huawei)公司的一款企业级交换机产品。
多款Huawei S系列交换机存在输入验证错误漏洞,该漏洞源于程序对Http报文特定参数的校验不充分。远程攻击者可通过发送构造的报文利用该漏洞导致交换机重启,造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn
Reference: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn
Impacted products
Name | ['Huawei S12700 V200R005C00', 'Huawei S12700 V200R006C00', 'Huawei S12700 V200R008C00', 'Huawei S12700 V200R007C00', 'Huawei S2300 V200R003C00', 'Huawei S12700 V200R010C00', 'Huawei S1700 V200R009C00', 'Huawei S1700 V200R010C00', 'Huawei S12700 V200R012C00', 'Huawei S12700 V200R013C00', 'Huawei S12700 V200R011C10', 'Huawei S1700 V200R008C00', 'Huawei S1700 V200R011C10', 'Huawei S1700 V200R012C00'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-5285", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5285" } }, "description": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u4f01\u4e1a\u7ea7\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\n\n\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u5bf9Http\u62a5\u6587\u7279\u5b9a\u53c2\u6570\u7684\u6821\u9a8c\u4e0d\u5145\u5206\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6784\u9020\u7684\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4ea4\u6362\u673a\u91cd\u542f\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "Codesafe Team of Legendsec at Qi\u0027anxin Group", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-25515", "openTime": "2019-08-02", "patchDescription": "Huawei S12700\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u4f01\u4e1a\u7ea7\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u5bf9Http\u62a5\u6587\u7279\u5b9a\u53c2\u6570\u7684\u6821\u9a8c\u4e0d\u5145\u5206\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6784\u9020\u7684\u62a5\u6587\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4ea4\u6362\u673a\u91cd\u542f\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Huawei S12700 V200R005C00", "Huawei S12700 V200R006C00", "Huawei S12700 V200R008C00", "Huawei S12700 V200R007C00", "Huawei S2300 V200R003C00", "Huawei S12700 V200R010C00", "Huawei S1700 V200R009C00", "Huawei S1700 V200R010C00", "Huawei S12700 V200R012C00", "Huawei S12700 V200R013C00", "Huawei S12700 V200R011C10", "Huawei S1700 V200R008C00", "Huawei S1700 V200R011C10", "Huawei S1700 V200R012C00" ] }, "referenceLink": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn", "serverity": "\u9ad8", "submitTime": "2019-05-22", "title": "\u591a\u6b3eHuawei S\u7cfb\u5217\u4ea4\u6362\u673a\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…