fkie_cve-2016-6518
Vulnerability from fkie_nvd
Published
2016-09-26 15:59
Modified
2025-04-12 10:46
Summary
Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets.
Impacted products
Vendor Product Version
huawei s5300_firmware v200r001c00
huawei s5300_firmware v200r002c00
huawei s5300_firmware v200r003c00
huawei s5300_firmware v200r005c00
huawei s5300_firmware v200r005c01
huawei s5300_firmware v200r005c02
huawei s5300_firmware v200r006c00
huawei s5300_firmware v200r007c00
huawei s5300_firmware v200r008c00
huawei s5300 -
huawei s12700_firmware v200r005c00
huawei s12700_firmware v200r006c00
huawei s12700_firmware v200r008c00
huawei s12700 -
huawei s6300_firmware v200r001c00
huawei s6300_firmware v200r002c00
huawei s6300_firmware v200r003c00
huawei s6300_firmware v200r005c00
huawei s6300_firmware v200r005c01
huawei s6300_firmware v200r005c02
huawei s6300_firmware v200r008c00
huawei s6300 -
huawei s7700_firmware v200r001c00
huawei s7700_firmware v200r002c00
huawei s7700_firmware v200r003c00
huawei s7700_firmware v200r005c00
huawei s7700_firmware v200r006c00
huawei s7700_firmware v200r008c00
huawei s7700 -
huawei s5700_firmware v200r001c00
huawei s5700_firmware v200r001c01
huawei s5700_firmware v200r002c00
huawei s5700_firmware v200r003c00
huawei s5700_firmware v200r003c02
huawei s5700_firmware v200r005c00
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r008c00
huawei s5700 -
huawei s6700_firmware v200r001c00
huawei s6700_firmware v200r001c01
huawei s6700_firmware v200r002c00
huawei s6700_firmware v200r003c00
huawei s6700_firmware v200r008c00
huawei s6700 -
huawei s9700_firmware v200r001c00
huawei s9700_firmware v200r001c01
huawei s9700_firmware v200r002c00
huawei s9700_firmware v200r003c00
huawei s9700_firmware v200r005c00
huawei s9700_firmware v200r006c00
huawei s9700_firmware v200r008c00
huawei s9700 -
huawei s9300_firmware v200r001c00
huawei s9300_firmware v200r003c00
huawei s9300_firmware v200r005c00
huawei s9300_firmware v200r006c00
huawei s9300_firmware v200r008c00
huawei s9300 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD6E677-2031-4AC4-A5FE-DED60F789127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD118E1-317E-4903-A4D0-51EBCFA58C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD601FFF-E623-4ADC-B286-D11B8004D7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EAEF900-7C8C-4569-B74B-A802F951CC47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2B09C5-81F1-48B4-940D-6DFD06200139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r005c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDC356D3-F015-46A0-8F7A-1C594F19535B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "58C2E728-E8F2-461D-A069-4BEC88B94FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD6B13D4-07F3-4CB5-8194-89781E685A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454BC21-A04F-4B3D-8533-2414B6E1BC8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFEF08E-54C5-4D60-AFF0-37B00D6E2DDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D81469B-EC6C-493D-B632-4DF821A1F304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F2C4C7-3438-42B8-8999-C17E45C8CF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "138C1E57-176C-46B1-9704-D9C8391CC802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A680CFA-9C46-453D-A5BC-8ED1EBD45C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B67169-BF28-4493-89E9-9AAB895D9456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C330A14-C941-4B28-AA9C-B78A96A9011D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6818ECD-730B-40D6-9108-B8540CC4BF1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r005c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EF72D9-ABCC-474C-A6B2-67944C32ED5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r005c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4FBF354-D5BD-438A-9348-B65A45789053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "939C73D9-E0E9-47A5-970E-6C84F5ECD2D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3C8988-A1FC-4B04-9134-F2BDDADEAFB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F49D3EAD-1EB3-4C62-80BA-4C9C3CE0408C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D75B012-A57D-4C6D-AB26-51D2ECC02F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DFF0C0-AA17-4AA1-A418-4759D1A58852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84F05D5-BA7D-485B-91C2-273349335CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3FB3CC-2EAC-4A08-BDDC-DCACEE9FA2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8769C2C4-E333-432B-8943-CFDFAE013379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "336AA440-AEF4-482B-A037-8976DC38BA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "228D261C-DB88-4AEE-91D3-772DD28E4CDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B2DE9FE-5EC9-462E-86F0-EE772C944DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4907FBB8-5157-460D-9240-DD7D610C0FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r003c02:*:*:*:*:*:*:*",
              "matchCriteriaId": "2898D6C5-77AB-4C1F-8134-B2DBD13EDB81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCF23DAE-1215-41B2-88C5-4436D846266C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5973A534-F961-4A97-B20E-994BA28AFE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22D3CFF-3353-4EE2-8933-84F395469D0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B7B7285-F4C6-415C-A948-D7612750A77D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CD40F46-5E04-43F0-A2DB-0ACBEC92C53F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6DC0AF-017E-41BC-A19D-F9AA055F5224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "749B68B9-9F62-4E7A-AC86-F4073BA32E18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA5CF67-A58B-4666-B87E-712507233453",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AC10D-B0DD-4206-8642-134DDD585C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B1F0B3D-1923-42C3-A3DB-03D11BE059D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "032E5E4D-B1B8-4659-8B62-3DC237234501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FB6ED15-477B-4BB5-AA94-0D7897FBD962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AD9ACA-E0C3-4096-BE50-94E717CDA318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "325D6523-A07A-48D4-AD44-CF838BD77432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC7E622-010C-4C5D-8AA6-D4793AFCE0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F37BC5-3B25-4E30-A1CA-5ACFA46119B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r003c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "473B6E52-E60F-4D3C-9028-E362DF2A8327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r005c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2632DC1D-0CB9-4493-9270-436139C88623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8AE44D-1924-4C01-B4B9-CC5BF485A3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7DB9D3-BB34-49BE-8302-A054D79FE8D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:s9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2EC926-50C6-4CBE-BB6F-56F3A6287DEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Huawei S9300, S5300, S5700, S6700, S7700, S9700, and S12700 devices allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of malformed packets."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en dispositivos Huawei S9300, S5300, S5700, S6700, S7700, S9700 y S12700 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y reinicio) a trav\u00e9s de un gran n\u00famero de paquetes malformados."
    }
  ],
  "id": "CVE-2016-6518",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-09-26T15:59:01.780",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92968"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-sep-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92968"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…