Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.
[
{
"product": "DP300; RP200; TE30; TE50; TE60; VP9660",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "DP300 V500R002C00"
},
{
"status": "affected",
"version": "RP200 V500R002C00"
},
{
"status": "affected",
"version": "V600R006C00"
},
{
"status": "affected",
"version": "TE30 V100R001C10"
},
{
"status": "affected",
"version": "TE50 V600R006C00"
},
{
"status": "affected",
"version": "TE60 V100R001C10"
},
{
"status": "affected",
"version": "V500R002C00"
},
{
"status": "affected",
"version": "VP9660 V500R002C10"
}
]
}
]