var-201604-0327
Vulnerability from variot
Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China's Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s9300", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "lt", "trust": 1.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s7700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s7700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5310hi", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5310hi", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s9300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2350ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s9300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300si", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s3300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s5300li", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s9700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s2300", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6300ei", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6300ei", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s9700", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s3300", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s7700", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s2300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300li", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5310hi", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s6300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s2350ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300ei", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s3300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s9300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s3300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s6300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s7700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s3300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5310hi", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s9700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph023" }, { "model": "s9300", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s2300", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v100r006sph022" }, { "model": "s5300ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300li", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300ei", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r003c00" }, { "model": "s2300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v100r006c05" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s5300li", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s7700", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r003sph011" }, { "model": "s9700", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5310hi", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s7700", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r002c00" }, { "model": "s5300si", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v200r001c00" }, { "model": "s2350ei", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "v200r001sph018" }, { "model": "s5300ei v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300ei v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si v200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r005c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720hi 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5720ei 200r006c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300 100r006c05", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s9300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2350ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7700", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300li", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5310hi", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3300", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s6300ei", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5300si", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:huawei:s2300", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s2300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s2350ei", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s2350ei_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s3300", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s3300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s5300ei", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s5300ei_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s5300li", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s5300li_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s5300si", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s5300si_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s5310hi", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s5310hi_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s6300ei", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s6300ei_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s7700", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s7700_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s9300", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s9300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:huawei:s9700", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:s9700_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007104" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported the issue.", "sources": [ { "db": "BID", "id": "90893" } ], "trust": 0.3 }, "cve": "CVE-2015-8676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2015-8676", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2016-02290", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-86637", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2015-8676", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-8676", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-8676", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-02290", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-313", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-86637", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in Huawei S5300EI, S5300SI, S5310HI, S6300EI/ S2350EI, and S5300LI Campus series switches with software V200R001C00 before V200R001SPH018, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; S9300, S7700, and S9700 Campus series switches with software V200R001C00 before V200R001SPH023, V200R002C00 before V200R003SPH011, and V200R003C00 before V200R003SPH011; and S2300 and S3300 Campus series switches with software V100R006C05 before V100R006SPH022 allows remote attackers to cause a denial of service (memory consumption and reboot) via a large number of ICMPv6 packets. HuaweiS5300EI is a Huawei S series switch product. The HuaweiS5300EI handles memory leaks in ICMPv6 packets, allowing remote attackers to exploit vulnerabilities to submit special requests for denial of service attacks. Multiple Huawei Switches are prone to a remote denial-of-service vulnerability. The Huawei S5300EI and others are all S-series switch products of China\u0027s Huawei (Huawei). Memory leak vulnerabilities exist in several Huawei products. The following products and versions are affected: Huawei S5300EI, S5300SI, S5310HI, S6300EI, S2350EI, S5300LI, S9300, S7700, and S9700 using software V200R001C00, V200R002C00, and V200R003C00;", "sources": [ { "db": "NVD", "id": "CVE-2015-8676" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "BID", "id": "90893" }, { "db": "VULHUB", "id": "VHN-86637" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8676", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2015-007104", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-313", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-02290", "trust": 0.6 }, { "db": "BID", "id": "90893", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-86637", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "BID", "id": "90893" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "id": "VAR-201604-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" } ], "trust": 1.61575809 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" } ] }, "last_update_date": "2024-11-23T21:54:38.182000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20160113-02-Switch", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "title": "Patches for various Huawei product switches ICMPv6 packet memory leak vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/74357" }, { "title": "Multiple Huawei Product memory leak vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60968" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 }, { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-02-switch-en" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8676" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8676" }, { "trust": 0.6, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-03-switch-en" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-02290" }, { "db": "VULHUB", "id": "VHN-86637" }, { "db": "BID", "id": "90893" }, { "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "db": "CNNVD", "id": "CNNVD-201604-313" }, { "db": "NVD", "id": "CVE-2015-8676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02290" }, { "date": "2016-04-14T00:00:00", "db": "VULHUB", "id": "VHN-86637" }, { "date": "2016-01-13T00:00:00", "db": "BID", "id": "90893" }, { "date": "2016-04-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-313" }, { "date": "2016-04-14T15:59:02.980000", "db": "NVD", "id": "CVE-2015-8676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-02290" }, { "date": "2019-06-20T00:00:00", "db": "VULHUB", "id": "VHN-86637" }, { "date": "2016-07-06T14:51:00", "db": "BID", "id": "90893" }, { "date": "2016-04-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007104" }, { "date": "2016-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-313" }, { "date": "2024-11-21T02:38:56.983000", "db": "NVD", "id": "CVE-2015-8676" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-313" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007104" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-313" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.