ID HUAWEI-SA-20160608-01-MPLS
Type huawei
Reporter Huawei Technologies
Modified 2016-11-16T00:00:00
Description
Products
Switches
Routers
WLAN
Servers
See All
Solutions
Cloud Data Center
Enterprise Networking
Wireless Private Network
Solutions by Industry
See All
Services
Training and Certification
ICT Lifecycle Services
Technology Services
Industry Solution Services
See All
See all offerings at e.huawei.com
Need Support ?
Product Support
Software Download
Community
Tools
Go to Full Support
{"id": "HUAWEI-SA-20160608-01-MPLS", "bulletinFamily": "software", "title": "Security Advisory - Memory Leak Vulnerability in Some Huawei Products", "description": "Products\n\nSwitches\nRouters\nWLAN\nServers\nSee All\n\n\n\nSolutions\n\nCloud Data Center\nEnterprise Networking\nWireless Private Network\nSolutions by Industry\nSee All\n\n\n\nServices\n\nTraining and Certification\nICT Lifecycle Services\nTechnology Services\nIndustry Solution Services\nSee All\n\n\n\nSee all offerings at e.huawei.com\n\n\n\nNeed Support ?\n\nProduct Support\nSoftware Download\nCommunity\nTools\n\nGo to Full Support", "published": "2016-06-08T00:00:00", "modified": "2016-11-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160608-01-mpls-en", "reporter": "Huawei Technologies", "references": [], "cvelist": ["CVE-2016-8797"], "type": "huawei", "lastseen": "2019-02-01T18:01:10", "edition": 1, "viewCount": 0, "enchantments": {"score": {"value": 5.3, "vector": "NONE", "modified": "2019-02-01T18:01:10", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-8797"]}], "modified": "2019-02-01T18:01:10", "rev": 2}, "vulnersScore": 5.3}, "affectedSoftware": [{"name": "S9300", "operator": "eq", "version": "V200R008C00"}, {"name": "S9300", "operator": "eq", "version": "V200R006C00"}, {"name": "S5700", "operator": "eq", "version": "V200R007C00"}, {"name": "S5300", "operator": "eq", "version": "V200R006C00"}, {"name": "S6700", "operator": "eq", "version": "V200R007C00"}, {"name": "S6700", "operator": "eq", "version": "V200R008C00"}, {"name": "S5700", "operator": "eq", "version": "V200R008C00"}, {"name": "S9700", "operator": "eq", "version": "V200R008C00"}, {"name": "AR3200", "operator": "eq", "version": "V200R007C00"}, {"name": "S9700", "operator": "eq", "version": "V200R006C00"}, {"name": "AR3200", "operator": "eq", "version": "V200R005C20"}, {"name": "S5300", "operator": "eq", "version": "V200R007C00"}, {"name": "S7700", "operator": "eq", "version": "V200R006C00"}, {"name": "S9300", "operator": "eq", "version": "V200R007C00"}, {"name": "S5300", "operator": "eq", "version": "V200R008C00"}, {"name": "S12700", "operator": "eq", "version": "V200R007C00"}, {"name": "S7700", "operator": "eq", "version": "V200R008C00"}, {"name": "S5700", "operator": "eq", "version": "V200R006C00"}, {"name": "S12700", "operator": "eq", "version": "V200R008C00"}, {"name": "S6300", "operator": "eq", "version": "V200R008C00"}, {"name": "AR3200", "operator": "eq", "version": "V200R005C32"}, {"name": "S7700", "operator": "eq", "version": "V200R007C00"}, {"name": "S6300", "operator": "eq", "version": "V200R007C00"}, {"name": "S9700", "operator": "eq", "version": "V200R007C00"}]}
{"cve": [{"lastseen": "2021-02-02T06:28:13", "description": "Huawei AR3200 with software V200R007C00, V200R005C32, V200R005C20; S12700 with software V200R008C00, V200R007C00; S5300 with software V200R008C00, V200R007C00, V200R006C00; S5700 with software V200R008C00, V200R007C00, V200R006C00; S6300 with software V200R008C00, V200R007C00; S6700 with software V200R008C00, V200R007C00; S7700 with software V200R008C00, V200R007C00, V200R006C00; S9300 with software V200R008C00, V200R007C00, V200R006C00; and S9700 with software V200R008C00, V200R007C00, V200R006C00 allow remote attackers to send abnormal Multiprotocol Label Switching (MPLS) packets to cause memory exhaustion.", "edition": 4, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-02T20:59:00", "title": "CVE-2016-8797", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-8797"], "modified": "2017-04-11T01:03:00", "cpe": ["cpe:/o:huawei:s6300_firmware:v200r007c00", "cpe:/o:huawei:s6300_firmware:v200r008c00", "cpe:/o:huawei:s5700_firmware:v200r008c00", "cpe:/o:huawei:s6700_firmware:v200r007c00", "cpe:/o:huawei:s9700_firmware:v200r007c00", "cpe:/o:huawei:s7700_firmware:v200r006c00", "cpe:/o:huawei:s5300_firmware:v200r007c00", "cpe:/o:huawei:s9300_firmware:v200r006c00", "cpe:/o:huawei:s12700_firmware:v200r007c00", "cpe:/o:huawei:s5700_firmware:v200r006c00", "cpe:/o:huawei:s7700_firmware:v200r008c00", "cpe:/o:huawei:s7700_firmware:v200r007c00", "cpe:/o:huawei:s9700_firmware:v200r006c00", "cpe:/o:huawei:s9300_firmware:v200r007c00", "cpe:/o:huawei:ar3200_firmware:v200r007c00", "cpe:/o:huawei:ar3200_firmware:v200r005c32", "cpe:/o:huawei:s9300_firmware:v200r008c00", "cpe:/o:huawei:s5300_firmware:v200r008c00", "cpe:/o:huawei:s12700_firmware:v200r008c00", "cpe:/o:huawei:s9700_firmware:v200r008c00", "cpe:/o:huawei:s6700_firmware:v200r008c00", "cpe:/o:huawei:s5700_firmware:v200r007c00", "cpe:/o:huawei:ar3200_firmware:v200r005c20", "cpe:/o:huawei:s5300_firmware:v200r006c00"], "id": "CVE-2016-8797", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8797", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6300_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9300_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s7700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*"]}]}