Lucene search

K

Huawei Data Communication: Buffer Overflow Vulnerability in Some Huawei Products (huawei-sa-20180502-02-cops)

🗓️ 26 May 2020 00:00:00Reported by Copyright (C) 2020 Greenbone Networks GmbHType 
openvas
 openvas
🔗 plugins.openvas.org👁 16 Views

Huawei products have a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module, allowing unauthenticated remote attackers to cause abnormal services

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2017-17317
2 Jul 201813:00
cvelist
CVE
CVE-2017-17317
2 Jul 201813:29
cve
Prion
Buffer overflow
2 Jul 201813:29
prion
NVD
CVE-2017-17317
2 Jul 201813:29
nvd
Huawei
Security Advisory - Buffer Overflow Vulnerability in Some Huawei Products
30 Jun 201800:00
huawei
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.107829");
  script_version("2020-06-05T12:34:50+0000");
  script_tag(name:"last_modification", value:"2020-06-05 12:34:50 +0000 (Fri, 05 Jun 2020)");
  script_tag(name:"creation_date", value:"2020-05-26 15:22:01 +0200 (Tue, 26 May 2020)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");

  script_cve_id("CVE-2017-17317");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Huawei Data Communication: Buffer Overflow Vulnerability in Some Huawei Products (huawei-sa-20180502-02-cops)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
  script_family("Huawei");
  script_dependencies("gb_huawei_vrp_network_device_consolidation.nasl");
  script_mandatory_keys("huawei/vrp/detected");

  script_tag(name:"summary", value:"There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products.");

  script_tag(name:"insight", value:"There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products. An unauthenticated, remote attacker has to control the peer device and send specially crafted message to the affected products. Due to insufficient input validation, successful exploit may cause some services abnormal. (Vulnerability ID: HWPSIRT-2017-04150)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17317.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.");

  script_tag(name:"impact", value:"Successful exploit may cause some services abnormal.");

  script_tag(name:"affected", value:"DP300 versions V500R002C00

RP200 versions V500R002C00SPC200 V600R006C00

Secospace USG6600 versions V500R001C20SPC206T V500R001C30SPC106TB003 V500R001C30SPC111T V500R001C30SPC113T V500R001C30SPC212T

TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00

TE40 versions V500R002C00SPC600 V600R006C00

TE50 versions V500R002C00SPC600 V600R006C00

TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_xref(name:"URL", value:"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180502-02-cops-en");

  exit(0);
}

include( "host_details.inc" );
include( "version_func.inc" );

cpe_list = make_list( "cpe:/o:huawei:dp300_firmware",
                      "cpe:/o:huawei:rp200_firmware",
                      "cpe:/o:huawei:te30_firmware",
                      "cpe:/o:huawei:te40_firmware",
                      "cpe:/o:huawei:te50_firmware",
                      "cpe:/o:huawei:te60_firmware" ) ;

if( ! infos = get_app_version_from_list( cpe_list:cpe_list, nofork:TRUE ) )
  exit( 0 );

cpe = infos["cpe"];
version = toupper( infos["version"] );

patch = get_kb_item( "huawei/vrp/patch" );

if( cpe =~ "^cpe:/o:huawei:te(3|4|5|6)0_firmware" ) {
  if( version == "V100R001C01" || version == "V100R001C02" || version == "V100R001C10" || version == "V500R002C00" ||
      version == "V600R006C00" ) {
    report = report_fixed_ver( installed_version:version, fixed_version:"V600R006C00SPC500" );
    security_message( port:0, data:report );
    exit( 0 );
  }
}

if( cpe == "cpe:/o:huawei:dp300_firmware" ) {
  if( version == "V500R002C00" ) {
    report = report_fixed_ver( installed_version:version, fixed_version:"V500R002C00SPCb00" );
    security_message( port:0, data:report );
    exit( 0 );
  }
}

if( cpe == "cpe:/o:huawei:rp200_firmware" ) {
  if( version == "V500R002C00" || version == "V600R006C00" ) {
    report = report_fixed_ver( installed_version:version, fixed_version:"V600R006C00SPC500" );
    security_message( port:0, data:report );
    exit( 0 );
  }
}

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 May 2020 00:00Current
0.4Low risk
Vulners AI Score0.4
EPSS0.00152
16
.json
Report