ID CVE-2017-17255
Type cve
Reporter cve@mitre.org
Modified 2018-06-04T14:08:00
Description
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
{"id": "CVE-2017-17255", "bulletinFamily": "NVD", "title": "CVE-2017-17255", "description": "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", "published": "2018-04-24T15:29:00", "modified": "2018-06-04T14:08:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17255", "reporter": "cve@mitre.org", "references": ["http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en"], "cvelist": ["CVE-2017-17255"], "type": "cve", "lastseen": "2019-05-29T18:16:55", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "03bbd4459510f962d188563918407ffe"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "7a41cc45524a000f118c76fce4d67b8b"}, {"key": "cpe23", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "e2857da78b7d446bea9e464cf87dfd62"}, {"key": "cvss", "hash": "41b62a8aa1ee5c40897717cadc30784a"}, {"key": "cvss2", "hash": "85fc9715d07b57d9e72056856b007c7b"}, {"key": "cvss3", "hash": "b5cef30da83f9b368c6b3bb523042642"}, {"key": "cwe", "hash": "f10299951f918c711504010cb77b610e"}, {"key": "description", "hash": "665c8e4c6c0b847ee9d6e27c564872b2"}, {"key": "href", "hash": "cd3d2175c3b741a827d68bf1ac571bfa"}, {"key": "modified", "hash": "44cd9fabe6479d38fdc7055ed1cd60dd"}, {"key": "published", "hash": "12200a559ee7808cdebfa35beb533493"}, {"key": "references", "hash": "fc6de243bb53a8754ff9077ada9e58f6"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "e2dfb65a058396e7fc08bedc24db9449"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "6cd4df387b9c3302b2ae04dd79935a4e7dd0e03f284ddb35fcd7e4c0b204ed7c", "viewCount": 0, "enchantments": {"score": {"value": 4.4, "vector": "NONE", "modified": "2019-05-29T18:16:55"}, "dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310113194"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20171227-01-H323"]}], "modified": "2019-05-29T18:16:55"}, "vulnersScore": 4.4}, "objectVersion": "1.3", "cpe": ["cpe:/a:huawei:secospace_usg6300_firmware:v100r001c30", "cpe:/a:huawei:srg1300_firmware:v200r007c02", "cpe:/a:huawei:srg1300_firmware:v200r007c00", "cpe:/a:huawei:srg3300_firmware:v200r006c10", "cpe:/a:huawei:viewpoint_9030_firmware:v100r011c03", "cpe:/a:huawei:usg9560_firmware:v300r001c20", "cpe:/a:huawei:nip6600_firmware:v500r001c30", "cpe:/a:huawei:secospace_usg6300_firmware:v500r001c20", "cpe:/a:huawei:secospace_usg6600_firmware:v100r001c10", "cpe:/a:huawei:netengine16ex_firmware:v200r007c00", "cpe:/a:huawei:te60_firmware:v500r002c00", "cpe:/a:huawei:usg9500_firmware:v500r001c20", "cpe:/a:huawei:ar2200_firmware:v200r007c01", "cpe:/a:huawei:ips_module_firmware:v500r001c30", "cpe:/a:huawei:ar510_firmware:v200r008c30", "cpe:/a:huawei:usg6000v_firmware:v500r001c20", "cpe:/a:huawei:ar2200_firmware:v200r007c02", "cpe:/a:huawei:svn5800_firmware:v200r003c00", "cpe:/a:huawei:secospace_usg6600_firmware:v500r001c30", "cpe:/a:huawei:ar160_firmware:v200r007c00", "cpe:/a:huawei:srg3300_firmware:v200r008c30", "cpe:/a:huawei:nip6300_firmware:v500r001c00", "cpe:/a:huawei:nip6300_firmware:v500r001c50", "cpe:/a:huawei:srg3300_firmware:v200r008c20", "cpe:/a:huawei:secospace_usg6300_firmware:v100r001c10", "cpe:/a:huawei:ips_module_firmware:v500r001c20", "cpe:/a:huawei:ar3200_firmware:v200r007c00", "cpe:/a:huawei:ar3200_firmware:v200r006c11", "cpe:/a:huawei:netengine16ex_firmware:v200r008c30", "cpe:/a:huawei:usg9580_firmware:v300r001c20", "cpe:/a:huawei:srg2300_firmware:v200r008c30", "cpe:/a:huawei:ngfw_module_firmware:v100r001c10spc200", "cpe:/a:huawei:srg2300_firmware:v200r007c02", "cpe:/a:huawei:ar1200-s_firmware:v200r008c30", "cpe:/a:huawei:ar120-s_firmware:v200r006c10", "cpe:/a:huawei:ar3200_firmware:v200r008c00", "cpe:/a:huawei:ar2200-s_firmware:v200r008c20", "cpe:/a:huawei:nip6600_firmware:v500r001c50", "cpe:/a:huawei:ar200_firmware:v200r008c30", "cpe:/a:huawei:ar150-s_firmware:v200r007c00", "cpe:/a:huawei:secospace_usg6500_firmware:v500r001c00", "cpe:/a:huawei:te60_firmware:v600r006c00", "cpe:/a:huawei:ar2200-s_firmware:v200r007c00", "cpe:/a:huawei:ar2200_firmware:v200r006c16pwe", "cpe:/a:huawei:ar150_firmware:v200r008c30", "cpe:/a:huawei:srg1300_firmware:v200r008c20", "cpe:/a:huawei:ar150_firmware:v200r007c00", "cpe:/a:huawei:ar1200_firmware:v200r006c10", "cpe:/a:huawei:ar200_firmware:v200r006c10", "cpe:/a:huawei:te60_firmware:v100r001c01", "cpe:/a:huawei:ar1200_firmware:v200r007c00", "cpe:/a:huawei:ar510_firmware:v200r006c17", "cpe:/a:huawei:ar1200-s_firmware:v200r008c20", "cpe:/a:huawei:ar120-s_firmware:v200r008c30", "cpe:/a:huawei:ar1200_firmware:v200r007c02", "cpe:/a:huawei:ar150_firmware:v200r008c20", "cpe:/a:huawei:ar200_firmware:v200r007c01", "cpe:/a:huawei:ar510_firmware:v200r008c20", "cpe:/a:huawei:ips_module_firmware:v500r001c00", "cpe:/a:huawei:ar1200_firmware:v200r006c13", "cpe:/a:huawei:secospace_usg6500_firmware:v100r001c10", "cpe:/a:huawei:ar120-s_firmware:v200r007c00", "cpe:/a:huawei:ar150_firmware:v200r007c02", "cpe:/a:huawei:ar200_firmware:v200r007c00", "cpe:/a:huawei:ar150_firmware:v200r006c10", "cpe:/a:huawei:srg3300_firmware:v200r007c00", "cpe:/a:huawei:ar3200_firmware:v200r008c30", "cpe:/a:huawei:te40_firmware:v600r006c00", "cpe:/a:huawei:ar200-s_firmware:v200r006c10", "cpe:/a:huawei:ips_module_firmware:v100r001c10spc200", "cpe:/a:huawei:ar510_firmware:v200r006c16", "cpe:/a:huawei:ar2200-s_firmware:v200r006c10", "cpe:/a:huawei:viewpoint_9030_firmware:v100r011c02", "cpe:/a:huawei:semg9811_firmware:v300r001c01", "cpe:/a:huawei:te30_firmware:v600r006c00", "cpe:/a:huawei:ar1200-s_firmware:v200r006c10", "cpe:/a:huawei:tp3206_firmware:v100r002c10", "cpe:/a:huawei:secospace_usg6600_firmware:v100r001c00spc200", "cpe:/a:huawei:ar200_firmware:v200r008c20", "cpe:/a:huawei:secospace_usg6300_firmware:v500r001c50", "cpe:/a:huawei:nip6600_firmware:v500r001c00", "cpe:/a:huawei:ar2200_firmware:v200r006c13", "cpe:/a:huawei:nip6300_firmware:v500r001c20", "cpe:/a:huawei:srg2300_firmware:v200r006c10", "cpe:/a:huawei:ar120-s_firmware:v200r008c20", "cpe:/a:huawei:ar3200_firmware:v200r006c10", "cpe:/a:huawei:te30_firmware:v100r001c02", "cpe:/a:huawei:ar150-s_firmware:v200r008c30", "cpe:/a:huawei:netengine16ex_firmware:v200r006c10", "cpe:/a:huawei:ar510_firmware:v200r006c13", "cpe:/a:huawei:ar2200_firmware:v200r007c00", "cpe:/a:huawei:ar3200_firmware:v200r008c20", "cpe:/a:huawei:te60_firmware:v100r001c10", "cpe:/a:huawei:ar3200_firmware:v200r007c01", "cpe:/a:huawei:ar160_firmware:v200r006c10", "cpe:/a:huawei:secospace_usg6300_firmware:v500r001c00", "cpe:/a:huawei:usg9500_firmware:v500r001c00", "cpe:/a:huawei:usg9500_firmware:v500r001c30", "cpe:/a:huawei:nip6600_firmware:v500r001c20", "cpe:/a:huawei:te50_firmware:v500r002c00", "cpe:/a:huawei:ar3600_firmware:v200r007c01", "cpe:/a:huawei:srg3300_firmware:v200r007c02", "cpe:/a:huawei:ar2200-s_firmware:v200r008c30", "cpe:/a:huawei:te40_firmware:v500r002c00", "cpe:/a:huawei:ar510_firmware:v200r006c15", "cpe:/a:huawei:nip6800_firmware:v500r001c50", "cpe:/a:huawei:ngfw_module_firmware:v500r001c20", "cpe:/a:huawei:usg9520_firmware:v300r001c20", "cpe:/a:huawei:ngfw_module_firmware:v100r001c20", "cpe:/a:huawei:ar160_firmware:v200r007c02", "cpe:/a:huawei:ar160_firmware:v200r008c30", "cpe:/a:huawei:usg9560_firmware:v300r001c01", "cpe:/a:huawei:srg2300_firmware:v200r008c20", "cpe:/a:huawei:vp9660_firmware:v500r002c10", "cpe:/a:huawei:ngfw_module_firmware:v500r001c00", "cpe:/a:huawei:viewpoint_8660_firmware:v100r008c03", "cpe:/a:huawei:tp3206_firmware:v100r002c00", "cpe:/a:huawei:svn5800-c_firmware:v200r003c10", "cpe:/a:huawei:tp3106_firmware:v100r002c00", "cpe:/a:huawei:ar2200_firmware:v200r008c20", "cpe:/a:huawei:ar3200_firmware:v200r008c10", "cpe:/a:huawei:secospace_usg6600_firmware:v100r001c30", "cpe:/a:huawei:te50_firmware:v600r006c00", "cpe:/a:huawei:netengine16ex_firmware:v200r008c20", "cpe:/a:huawei:ar200-s_firmware:v200r008c30", "cpe:/a:huawei:secospace_usg6600_firmware:v500r001c50", "cpe:/a:huawei:ar160_firmware:v200r008c20", "cpe:/a:huawei:usg9500_firmware:v500r001c50", "cpe:/a:huawei:usg9580_firmware:v300r001c01", "cpe:/a:huawei:ar3200_firmware:v200r007c02", "cpe:/a:huawei:secospace_usg6300_firmware:v100r001c20", "cpe:/a:huawei:srg1300_firmware:v200r006c10", "cpe:/a:huawei:ar3600_firmware:v200r007c00", "cpe:/a:huawei:ar160_firmware:v200r006c12", "cpe:/a:huawei:ngfw_module_firmware:v100r001c30", "cpe:/a:huawei:svn5600_firmware:v200r003c00", "cpe:/a:huawei:ar2200_firmware:v200r006c10", "cpe:/a:huawei:ngfw_module_firmware:v500r002c00", "cpe:/a:huawei:ar510_firmware:v200r006c10", "cpe:/a:huawei:ar1200-s_firmware:v200r007c00", "cpe:/a:huawei:secospace_usg6600_firmware:v500r001c00", "cpe:/a:huawei:ar150_firmware:v200r007c01", "cpe:/a:huawei:te30_firmware:v500r002c00", "cpe:/a:huawei:ar3600_firmware:v200r006c10", "cpe:/a:huawei:secospace_usg6500_firmware:v500r001c30", "cpe:/a:huawei:secospace_usg6600_firmware:v500r001c60", "cpe:/a:huawei:ar1200_firmware:v200r007c01", "cpe:/a:huawei:svn5800_firmware:v200r003c10", "cpe:/a:huawei:ar3600_firmware:v200r008c20", "cpe:/a:huawei:ar160_firmware:v200r007c01", "cpe:/a:huawei:ar1200_firmware:v200r008c20", "cpe:/a:huawei:ar150-s_firmware:v200r006c10spc300", "cpe:/a:huawei:ips_module_firmware:v100r001c30", "cpe:/a:huawei:ar510_firmware:v200r006c12", "cpe:/a:huawei:secospace_usg6500_firmware:v500r001c50", "cpe:/a:huawei:svn5800-c_firmware:v200r003c00", "cpe:/a:huawei:secospace_usg6500_firmware:v100r001c20", "cpe:/a:huawei:secospace_usg6600_firmware:v100r001c20", "cpe:/a:huawei:ngfw_module_firmware:v500r002c10", "cpe:/a:huawei:ar200-s_firmware:v200r007c00", "cpe:/a:huawei:secospace_usg6500_firmware:v500r001c20", "cpe:/a:huawei:secospace_usg6600_firmware:v500r001c20", "cpe:/a:huawei:nip6300_firmware:v500r001c30", "cpe:/a:huawei:ar2200_firmware:v200r008c30", "cpe:/a:huawei:rse6500_firmware:v500r002c00", "cpe:/a:huawei:dp300_firmware:v500r002c00", "cpe:/a:huawei:secospace_usg6300_firmware:v500r001c30", "cpe:/a:huawei:ar150-s_firmware:v200r008c20", "cpe:/a:huawei:svn5600_firmware:v200r003c10", "cpe:/a:huawei:te30_firmware:v100r001c10", "cpe:/a:huawei:secospace_usg6500_firmware:v100r001c30", "cpe:/a:huawei:ar200-s_firmware:v200r008c20", "cpe:/a:huawei:srg2300_firmware:v200r007c00", "cpe:/a:huawei:ips_module_firmware:v500r001c50", "cpe:/a:huawei:ar1200_firmware:v200r008c30", "cpe:/a:huawei:vp9660_firmware:v500r002c00", "cpe:/a:huawei:srg1300_firmware:v200r008c30", "cpe:/a:huawei:usg9520_firmware:v300r001c01", "cpe:/a:huawei:ar510_firmware:v200r007c00spc180t"], "affectedSoftware": [{"name": "huawei te50_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei ar2200-s_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei usg9520_firmware", "operator": "eq", "version": "v300r001c01"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei srg1300_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei ar3600_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei ar150-s_firmware", "operator": "eq", "version": "v200r006c10spc300"}, {"name": "huawei tp3106_firmware", "operator": "eq", "version": "v100r002c00"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ar150-s_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei srg2300_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei usg9500_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei nip6800_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei ar3600_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei svn5800-c_firmware", "operator": "eq", "version": "v200r003c00"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r008c10"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei ar200-s_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r006c12"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei nip6300_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v100r001c30"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei netengine16ex_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei te60_firmware", "operator": "eq", "version": "v100r001c01"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei svn5800-c_firmware", "operator": "eq", "version": "v200r003c10"}, {"name": "huawei ar200-s_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei srg3300_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v100r001c10spc200"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v100r001c10"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v100r001c20"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei srg2300_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ar200_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei te30_firmware", "operator": "eq", "version": "v100r001c02"}, {"name": "huawei srg1300_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei usg6000v_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei usg9500_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei tp3206_firmware", "operator": "eq", "version": "v100r002c00"}, {"name": "huawei te30_firmware", "operator": "eq", "version": "v100r001c10"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v100r001c00spc200"}, {"name": "huawei nip6600_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei usg9580_firmware", "operator": "eq", "version": "v300r001c20"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v100r001c20"}, {"name": "huawei usg9580_firmware", "operator": "eq", "version": "v300r001c01"}, {"name": "huawei srg1300_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei semg9811_firmware", "operator": "eq", "version": "v300r001c01"}, {"name": "huawei te30_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei nip6600_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei srg3300_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar200_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r008c00"}, {"name": "huawei ar200-s_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c12"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei viewpoint_9030_firmware", "operator": "eq", "version": "v100r011c02"}, {"name": "huawei usg9520_firmware", "operator": "eq", "version": "v300r001c20"}, {"name": "huawei srg3300_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei nip6300_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v100r001c30"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r006c13"}, {"name": "huawei nip6600_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r006c11"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei netengine16ex_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar3600_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei netengine16ex_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei dp300_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v100r001c10"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei svn5600_firmware", "operator": "eq", "version": "v200r003c10"}, {"name": "huawei ar2200-s_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei srg1300_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v100r001c30"}, {"name": "huawei vp9660_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei ar2200-s_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei te50_firmware", "operator": "eq", "version": "v600r006c00"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei ar200_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei nip6600_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei usg9560_firmware", "operator": "eq", "version": "v300r001c01"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v500r002c10"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c15"}, {"name": "huawei srg2300_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v500r001c20"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei rse6500_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei te60_firmware", "operator": "eq", "version": "v600r006c00"}, {"name": "huawei svn5800_firmware", "operator": "eq", "version": "v200r003c00"}, {"name": "huawei ar120-s_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei tp3206_firmware", "operator": "eq", "version": "v100r002c10"}, {"name": "huawei srg2300_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei srg3300_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei nip6300_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v100r001c30"}, {"name": "huawei ar200-s_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei ar150-s_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei srg1300_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar1200-s_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei vp9660_firmware", "operator": "eq", "version": "v500r002c10"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei netengine16ex_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r006c13"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar3200_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei nip6300_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei srg2300_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v100r001c20"}, {"name": "huawei svn5800_firmware", "operator": "eq", "version": "v200r003c10"}, {"name": "huawei ar120-s_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei usg9500_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei ar120-s_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei secospace_usg6600_firmware", "operator": "eq", "version": "v500r001c60"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei te60_firmware", "operator": "eq", "version": "v100r001c10"}, {"name": "huawei viewpoint_8660_firmware", "operator": "eq", "version": "v100r008c03"}, {"name": "huawei ar3600_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei te40_firmware", "operator": "eq", "version": "v600r006c00"}, {"name": "huawei ips_module_firmware", "operator": "eq", "version": "v100r001c10spc200"}, {"name": "huawei srg3300_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei te30_firmware", "operator": "eq", "version": "v600r006c00"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v100r001c10"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei ar1200-s_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar200_firmware", "operator": "eq", "version": "v200r008c20"}, {"name": "huawei ar150_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei secospace_usg6300_firmware", "operator": "eq", "version": "v500r001c30"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei ar160_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei usg9500_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei te40_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c17"}, {"name": "huawei ar120-s_firmware", "operator": "eq", "version": "v200r006c10"}, {"name": "huawei ar1200-s_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v100r001c30"}, {"name": "huawei svn5600_firmware", "operator": "eq", "version": "v200r003c00"}, {"name": "huawei ar2200-s_firmware", "operator": "eq", "version": "v200r008c30"}, {"name": "huawei ar200_firmware", "operator": "eq", "version": "v200r007c01"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r007c00spc180t"}, {"name": "huawei ar1200_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei viewpoint_9030_firmware", "operator": "eq", "version": "v100r011c03"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v100r001c20"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r007c02"}, {"name": "huawei usg9560_firmware", "operator": "eq", "version": "v300r001c20"}, {"name": "huawei ar150-s_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei te60_firmware", "operator": "eq", "version": "v500r002c00"}, {"name": "huawei secospace_usg6500_firmware", "operator": "eq", "version": "v500r001c50"}, {"name": "huawei ar1200-s_firmware", "operator": "eq", "version": "v200r007c00"}, {"name": "huawei ar2200_firmware", "operator": "eq", "version": "v200r006c16pwe"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c13"}, {"name": "huawei ngfw_module_firmware", "operator": "eq", "version": "v500r001c00"}, {"name": "huawei ar510_firmware", "operator": "eq", "version": "v200r006c16"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "cpe23": [], "cwe": ["CWE-476"]}
{"openvas": [{"lastseen": "2019-10-09T15:01:31", "bulletinFamily": "scanner", "description": "Huawei Switches are prone to multiple vulnerabilities.", "modified": "2019-10-07T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310113194", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113194", "title": "Huawei Switches Multiple Vulnerabilities (sa-20171227-01-h323)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Huawei Switches Multiple Vulnerabilities (sa-20171227-01-h323)\n#\n# Authors:\n# Jan Philipp Schulte <jan.schulte@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, https://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif( description )\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113194\");\n script_version(\"2019-10-07T14:34:48+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-07 14:34:48 +0000 (Mon, 07 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 12:57:41 +0200 (Wed, 23 May 2018)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2017-17251\", \"CVE-2017-17252\", \"CVE-2017-17253\", \"CVE-2017-17254\", \"CVE-2017-17255\", \"CVE-2017-17256\", \"CVE-2017-17257\", \"CVE-2017-17258\");\n\n script_name(\"Huawei Switches Multiple Vulnerabilities (sa-20171227-01-h323)\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_huawei_switch_detect.nasl\");\n script_mandatory_keys(\"huawei_switch/detected\", \"huawei_switch/model\", \"huawei_switch/version\");\n\n script_tag(name:\"summary\", value:\"Huawei Switches are prone to multiple vulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The vulnerabilities exist due to:\n\n - Null pointer dereference\n\n - Out-of-Bounds read\n\n - Memory Leak\n\n - Resource Management vulnerability\n\n An attacker could send malformed packages to exploit these vulnerabilities.\");\n script_tag(name:\"impact\", value:\"Successful exploitation could crash processes or render the product temporarily inaccessible.\");\n script_tag(name:\"affected\", value:\"The following products and firmware versions are affected:\n\n - AR120-S / AR1200-S / AR200-S / AR2200-S / SRG3300: V200R006C10, V200R007C00, V200R008C20, V200R008C30\n\n - SRG1300 / SRG2300: V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30\n\n - AR150-S: V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30\n\n - AR200: V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30\n\n - AR1200: V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30\n\n - AR150: V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30\n\n - AR160: V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30\n\n - AR2200: V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30\n\n - AR3200: V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30\n\n - AR3600: V200R006C10, V200R007C00, V200R007C01, V200R008C20\n\n - AR510: V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30\n\n - DP300: V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50\n\n - NGFW Module: V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10\n\n - NIP6300 / NIP6600: V500R001C00, V500R001C20, V500R001C30, V500R001C50\n\n - NIP6800: V500R001C50\n\n - NetEngine16EX: V200R006C10, V200R007C00, V200R008C20, V200R008C30\n\n - RSE6500 V500R002C00\n\n - SVN5600 / SVN5800 / SVN5800-C: V200R003C00, V200R003C10\n\n - SeMG9811 V300R001C01\n\n - Secospace USG6300 / Secospace USG6500: V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50\n\n - Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60\n\n - TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00\n\n - TE40 / TE50: V500R002C00, V600R006C00\n\n - TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00\n\n - TP3106 V100R002C00\n\n - TP3206 V100R002C00, V100R002C10\n\n - USG6000V V500R001C20\n\n - USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50\n\n - USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20\n\n - USG9580 V300R001C01, V300R001C20\n\n - VP9660 V500R002C00, V500R002C10\n\n - ViewPoint 8660 V100R008C03\n\n - ViewPoint 9030 V100R011C02\");\n script_tag(name:\"solution\", value:\"The following device/firmware combinations contain a fix:\n\n - AR120-S / AR1200 / AR1200-S / AR150 / AR150-S / AR160 / AR200 / AR200-S / AR2200 / AR2200-S / AR3200 / AR3600 / AR510 / NetEngine16EX / SRG1300 / SRG2300 / SRG3300 : V200R009C00\n\n - DP300 / RSE6500: V500R002C00SPCb00\n\n - IPS Module / NGFW Module / NIP6300 / NIP6600 / NIP6800: V500R001C60SPC500\n\n - SVN5600 / SVN5800 / SVN5800-C: V200R003C10SPCa00\n\n - SeMG9811: V500R002C20SPC500\n\n - Secospace USG6300 / Secospace USG6500 / Secospace USG6600: V500R001C60SPC500\n\n - TE30 / TE40 / TE50 / TE60: V600R006C00SPC500\n\n - TP3106: V100R002C00\n\n - TP3206: V100R002C00SPC800\n\n - USG6000V: V500R003C00\n\n - USG9500 / USG9520 / USG9560 / USG9580: V500R001C60SPC500\n\n - VP9660: V500R002C10SPCb00\n\n - ViewPoint 8660: V100R008C03SPCe00\n\n - ViewPoint 9030: V100R011C03SPC900\");\n\n script_xref(name:\"URL\", value:\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en\");\n\n exit(0);\n}\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\ninclude( \"revisions-lib.inc\" );\n\nif( ! model = get_kb_item( \"huawei_switch/model\" ) ) exit( 0 );\nif( ! version = get_kb_item( \"huawei_switch/version\" ) ) exit( 0 );\n\nif( ( model =~ '^AR[0-9]{3,4}(-S)?' || model =~ '^SRG[123]300' || model =~ 'NetEngine16EX' ) && revcomp( a: version, b: \"v200r009c00\" ) < 0) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V200R009C00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( ( model =~ 'DP300' || model =~ 'RSE6500' ) && revcomp( a: version, b: \"v500r002c00spcb00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R002C00SPCb00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( ( model =~ 'IPS Module' || model =~ 'NGFW Module' || model =~ 'NIP6[368]00' ) && revcomp( a: version, b: \"v500r001c60spc500\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R001C60SPC500\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '^SVN5[68]00(-C)?' && revcomp( a: version, b: \"v200r003c10spca00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V200R003C10SPCa00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ 'SeMG9811' && revcomp( a: version, b: \"v500r002c20spc500\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R002C20SPC500\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ 'USG6[356]00' && revcomp( a: version, b: \"v500r001c60spc500\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R001C60SPC500\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '^TE[3456]0' && revcomp( a: version, b: \"v600r006c00spc500\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V600R006C00SPC500\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '^TP3106' && revcomp( a: version, b: \"v100r002c00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V100R002C00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '^TP3206' && revcomp( a: version, b: \"v100r002c00spc800\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V100R002C00SPC800\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ 'USG6000V' && revcomp( a: version, b: \"v500r003c00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R003C00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ 'USG95[0268]0' && revcomp( a: version, b: \"v500r001c60spc500\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R001C60SPC500\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '(VP|VP |ViewPoint )9660' && revcomp( a: version, b: \"v500r002c10spcb00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V500R002C10SPCb00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '(VP|VP |ViewPoint )8660' && revcomp( a: version, b: \"v100r008c03spce00\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V100R008C04SPCe00\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nif( model =~ '(VP|VP |ViewPoint )9030' && revcomp( a: version, b: \"v100r011c03spc900\" ) < 0 ) {\n report = report_fixed_ver( installed_version: toupper( version ), fixed_version: \"V100R011C03SPC900\" );\n security_message( port: 0, data: report );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "huawei": [{"lastseen": "2019-02-01T18:01:18", "bulletinFamily": "software", "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "modified": "2018-04-18T00:00:00", "published": "2017-12-27T00:00:00", "id": "HUAWEI-SA-20171227-01-H323", "href": "https://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171227-01-h323-en", "title": "Security Advisory - Several Vulnerabilities in H323 Protocol of Huawei Products", "type": "huawei", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}