Huawei products have a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module, allowing unauthenticated remote attackers to cause abnormal services
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2017-17317 | 2 Jul 201813:00 | – | cvelist |
![]() | CVE-2017-17317 | 2 Jul 201813:29 | – | cve |
![]() | Buffer overflow | 2 Jul 201813:29 | – | prion |
![]() | CVE-2017-17317 | 2 Jul 201813:29 | – | nvd |
![]() | Security Advisory - Buffer Overflow Vulnerability in Some Huawei Products | 30 Jun 201800:00 | – | huawei |
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.107829");
script_version("2020-06-05T12:34:50+0000");
script_tag(name:"last_modification", value:"2020-06-05 12:34:50 +0000 (Fri, 05 Jun 2020)");
script_tag(name:"creation_date", value:"2020-05-26 15:22:01 +0200 (Tue, 26 May 2020)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_cve_id("CVE-2017-17317");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Huawei Data Communication: Buffer Overflow Vulnerability in Some Huawei Products (huawei-sa-20180502-02-cops)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
script_family("Huawei");
script_dependencies("gb_huawei_vrp_network_device_consolidation.nasl");
script_mandatory_keys("huawei/vrp/detected");
script_tag(name:"summary", value:"There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products.");
script_tag(name:"insight", value:"There is a buffer overflow vulnerability in the Common Open Policy Service Protocol (COPS) module of some Huawei products. An unauthenticated, remote attacker has to control the peer device and send specially crafted message to the affected products. Due to insufficient input validation, successful exploit may cause some services abnormal. (Vulnerability ID: HWPSIRT-2017-04150)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-17317.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.");
script_tag(name:"impact", value:"Successful exploit may cause some services abnormal.");
script_tag(name:"affected", value:"DP300 versions V500R002C00
RP200 versions V500R002C00SPC200 V600R006C00
Secospace USG6600 versions V500R001C20SPC206T V500R001C30SPC106TB003 V500R001C30SPC111T V500R001C30SPC113T V500R001C30SPC212T
TE30 versions V100R001C02B053SP02 V100R001C10 V500R002C00SPC200 V600R006C00
TE40 versions V500R002C00SPC600 V600R006C00
TE50 versions V500R002C00SPC600 V600R006C00
TE60 versions V100R001C01SPC100 V100R001C10 V500R002C00 V600R006C00");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_xref(name:"URL", value:"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180502-02-cops-en");
exit(0);
}
include( "host_details.inc" );
include( "version_func.inc" );
cpe_list = make_list( "cpe:/o:huawei:dp300_firmware",
"cpe:/o:huawei:rp200_firmware",
"cpe:/o:huawei:te30_firmware",
"cpe:/o:huawei:te40_firmware",
"cpe:/o:huawei:te50_firmware",
"cpe:/o:huawei:te60_firmware" ) ;
if( ! infos = get_app_version_from_list( cpe_list:cpe_list, nofork:TRUE ) )
exit( 0 );
cpe = infos["cpe"];
version = toupper( infos["version"] );
patch = get_kb_item( "huawei/vrp/patch" );
if( cpe =~ "^cpe:/o:huawei:te(3|4|5|6)0_firmware" ) {
if( version == "V100R001C01" || version == "V100R001C02" || version == "V100R001C10" || version == "V500R002C00" ||
version == "V600R006C00" ) {
report = report_fixed_ver( installed_version:version, fixed_version:"V600R006C00SPC500" );
security_message( port:0, data:report );
exit( 0 );
}
}
if( cpe == "cpe:/o:huawei:dp300_firmware" ) {
if( version == "V500R002C00" ) {
report = report_fixed_ver( installed_version:version, fixed_version:"V500R002C00SPCb00" );
security_message( port:0, data:report );
exit( 0 );
}
}
if( cpe == "cpe:/o:huawei:rp200_firmware" ) {
if( version == "V500R002C00" || version == "V600R006C00" ) {
report = report_fixed_ver( installed_version:version, fixed_version:"V600R006C00SPC500" );
security_message( port:0, data:report );
exit( 0 );
}
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo