Search criteria
18 vulnerabilities found for s3700 by huawei
VAR-201504-0247
Vulnerability from variot - Updated: 2025-12-22 22:03The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. (plaintext-recovery attack) There is a vulnerability that can be executed. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol.
For the oldstable distribution (wheezy), these problems have been fixed in version 7u79-2.5.6-1~deb7u1.
For the stable distribution (jessie), these problems have been fixed in version 7u79-2.5.6-1~deb8u1.
For the unstable distribution (sid), these problems have been fixed in version 7u79-2.5.6-1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04779034
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04779034 Version: 2
HPSBST03418 rev.2 - HP P6000 Command View Software, Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-09-15 Last Updated: 2015-10-01
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerabilities have been identified with HP P6000 Command View Software . They are the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", and the RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" which could be exploited remotely to allow disclosure of information.
References:
CVE-2014-3566 - "POODLE" CVE-2015-2808 - "Bar Mitzvah" SSRT102013
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP P6000 Command View Software v10.3.6 and earlier running on Windows and Linux
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has released the following software update to resolve the vulnerability in HP P6000 Command View Software.
HP P6000 Command View Software v10.3.7
The HP P6000 Command View 10.3.7 software can be obtained at the HP Support Center here: http://h20565.www2.hpe.com/portal/site/hpsc by signing into your HP Passport account. Note: A valid HP Passport account is required to access this software. For more information about downloading this software, contact your HP representative.
HISTORY Version:1 (rev.1) - 15 September 2015 Initial release Version:2 (rev.2) - 1 October 2015 Added CVE-2015-2808, added documentation on how to find the update.
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-2696-1 July 30, 2015
openjdk-7 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in OpenJDK 7.
Software Description: - openjdk-7: Open Source Java implementation
Details:
Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. (CVE-2015-2590, CVE-2015-2628, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4760, CVE-2015-4748)
Several vulnerabilities were discovered in the cryptographic components of the OpenJDK JRE. An attacker could exploit these to expose sensitive data over the network. An attacker could exploit these to expose sensitive data over the network. A remote attacker could exploit this to cause a denial of service. (CVE-2015-4749)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: icedtea-7-jre-jamvm 7u79-2.5.6-0ubuntu1.15.04.1 openjdk-7-jdk 7u79-2.5.6-0ubuntu1.15.04.1 openjdk-7-jre 7u79-2.5.6-0ubuntu1.15.04.1 openjdk-7-jre-headless 7u79-2.5.6-0ubuntu1.15.04.1 openjdk-7-jre-lib 7u79-2.5.6-0ubuntu1.15.04.1 openjdk-7-jre-zero 7u79-2.5.6-0ubuntu1.15.04.1
Ubuntu 14.04 LTS: icedtea-7-jre-jamvm 7u79-2.5.6-0ubuntu1.14.04.1 openjdk-7-jdk 7u79-2.5.6-0ubuntu1.14.04.1 openjdk-7-jre 7u79-2.5.6-0ubuntu1.14.04.1 openjdk-7-jre-headless 7u79-2.5.6-0ubuntu1.14.04.1 openjdk-7-jre-lib 7u79-2.5.6-0ubuntu1.14.04.1 openjdk-7-jre-zero 7u79-2.5.6-0ubuntu1.14.04.1
This update uses a new upstream release, which includes additional bug fixes.
- The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. HP Integration Adaptor v9.12. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: java-1.6.0-openjdk security update Advisory ID: RHSA-2015:1526-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1526.html Issue date: 2015-07-30 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 =====================================================================
- Summary:
Updated java-1.6.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit.
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748)
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601)
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808)
Note: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000)
Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749)
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625)
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm
i386: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm
i386: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm
ppc64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm
s390x: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.s390x.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.s390x.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm
s390x: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.s390x.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.s390x.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVulvzXlSAg2UNWIIRAmaeAJoCxD34LErxdkOHHsYpS21hu8NJ7ACgnbxy AM58F212G/DZWyApoAfiS38= =UmAX -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 5) - i386, ppc, s390x, x86_64
- Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
606442 - CVE-2005-1080 jar: directory traversal vulnerability 1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1210355 - CVE-2015-0478 OpenJDK: RSA implementation hardening (JCE, 8071726) 1210829 - CVE-2015-0469 ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) 1211299 - CVE-2015-0477 OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) 1211504 - CVE-2015-0480 OpenJDK: jar directory traversal issues (Tools, 8064601) 1211543 - CVE-2015-0488 OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) 1211768 - CVE-2015-0459 Oracle JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) 1211769 - CVE-2015-0491 Oracle JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) 1211771 - CVE-2015-0458 Oracle JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) 1219212 - CVE-2015-0192 IBM JDK: unspecified Java sandbox restrictions bypass 1219215 - CVE-2015-1914 IBM JDK: unspecified partial Java sandbox restrictions bypass 1219223 - CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK)
6
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201504-0247",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "sparc enterprise m5000",
"scope": "lt",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp_1121"
},
{
"model": "smc2.0",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c01"
},
{
"model": "integrated lights out manager",
"scope": "gte",
"trust": 1.0,
"vendor": "oracle",
"version": "4.0.0"
},
{
"model": "smc2.0",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c04"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "13.2"
},
{
"model": "oceanstor 18500",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "communications application session controller",
"scope": "gte",
"trust": 1.0,
"vendor": "oracle",
"version": "3.0.0"
},
{
"model": "communications application session controller",
"scope": "lte",
"trust": 1.0,
"vendor": "oracle",
"version": "3.9.0"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "15.04"
},
{
"model": "oceanstor 18800f",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "oceanstor s6800t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "sparc enterprise m3000",
"scope": "gte",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "13.1"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "cognos metrics manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "10.2.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "oceanstor 9000",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "s5720ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "http server",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "12.2.1.1.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "oceanstor cse",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "s2750",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.1"
},
{
"model": "oceanstor s2600t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "policy center",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "sparc enterprise m4000",
"scope": "lt",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp_1121"
},
{
"model": "satellite",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.7"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "cognos metrics manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "10.2"
},
{
"model": "http server",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "11.1.1.7.0"
},
{
"model": "http server",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "11.1.1.9.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "integrated lights out manager",
"scope": "lte",
"trust": 1.0,
"vendor": "oracle",
"version": "3.2.11"
},
{
"model": "cognos metrics manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "10.2.2"
},
{
"model": "sparc enterprise m8000",
"scope": "lt",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp_1121"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "integrated lights out manager",
"scope": "lte",
"trust": 1.0,
"vendor": "oracle",
"version": "4.0.4"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "oceanstor hvs85t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "oceanstor s5800t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "te60",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "communications policy management",
"scope": "lt",
"trust": 1.0,
"vendor": "oracle",
"version": "9.9.2"
},
{
"model": "integrated lights out manager",
"scope": "gte",
"trust": 1.0,
"vendor": "oracle",
"version": "3.0.0"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "http server",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "12.2.1.2.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "oceanstor s5500t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "sparc enterprise m9000",
"scope": "lt",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp_1121"
},
{
"model": "ultravr",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "cognos metrics manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "10.1"
},
{
"model": "satellite",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.6"
},
{
"model": "oceanstor replicationdirector",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "oceanstor vis6600t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "quidway s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "s5710ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "e6000",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "smc2.0",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c03"
},
{
"model": "oceanstor s5600t",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "cognos metrics manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "10.1.1"
},
{
"model": "sparc enterprise m3000",
"scope": "lt",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp_1121"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "s5700s-li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "sparc enterprise m4000",
"scope": "gte",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp"
},
{
"model": "manager",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "1.7"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "http server",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "12.1.3.0.0"
},
{
"model": "e9000",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "sparc enterprise m5000",
"scope": "gte",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp"
},
{
"model": "policy center",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c10"
},
{
"model": "smc2.0",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r002c02"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "sparc enterprise m8000",
"scope": "gte",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "sparc enterprise m9000",
"scope": "gte",
"trust": 1.0,
"vendor": "fujitsu",
"version": "xcp"
},
{
"model": "linux enterprise debuginfo",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "oceanstor 18800",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "hitachi developer\u0027s kit for java",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus service architect",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus developer standard",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hp transactionvision",
"scope": null,
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
"version": null
},
{
"model": "hp release control",
"scope": null,
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
"version": null
},
{
"model": "jp1/it desktop management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "chrome",
"scope": null,
"trust": 0.8,
"vendor": "google",
"version": null
},
{
"model": "hitachi application server for developers",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus developer\u0027s kit for java",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus developer standard version 6",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "opera",
"scope": null,
"trust": 0.8,
"vendor": "opera asa",
"version": null
},
{
"model": "oracle java se",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "ucosminexus service platform",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server standard",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus developer light version 6",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "oracle jrockit",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "cosminexus primary server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "microsoft internet explorer",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "cosminexus http server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "glassfish",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "hp business process insight",
"scope": null,
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
"version": null
},
{
"model": "oracle communications policy management",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "cosminexus developer version 5",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "job management partner 1/it desktop management",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus application server standard",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "sparc enterprise m9000 \u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "ucosminexus application server smart edition",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "sparc enterprise m4000 \u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "jdk",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "ucosminexus server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "safari",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "ucosminexus developer light",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus operator",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hpe data protector",
"scope": null,
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9 \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba",
"version": null
},
{
"model": "jre",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "jboss enterprise application server",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "hp business process monitor",
"scope": null,
"trust": 0.8,
"vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
"version": null
},
{
"model": "sun glassfish enterprise server",
"scope": null,
"trust": 0.8,
"vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
"version": null
},
{
"model": "ucosminexus client",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus application server enterprise",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hitachi application server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "microsoft iis",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "sparc enterprise m5000 \u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "sparc enterprise m8000 \u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "ucosminexus primary server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus developer professional version 6",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "cosminexus application server version 5",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "xcp",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "sparc enterprise m3000 \u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e9\u30af\u30eb",
"version": null
},
{
"model": "websphere application server",
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": "cosminexus application server enterprise",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "hitachi web server",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "ucosminexus developer",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "firefox",
"scope": null,
"trust": 0.8,
"vendor": "mozilla",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP",
"sources": [
{
"db": "PACKETSTORM",
"id": "133836"
},
{
"db": "PACKETSTORM",
"id": "132890"
},
{
"db": "PACKETSTORM",
"id": "133329"
},
{
"db": "PACKETSTORM",
"id": "133337"
},
{
"db": "PACKETSTORM",
"id": "132345"
},
{
"db": "PACKETSTORM",
"id": "132872"
}
],
"trust": 0.6
},
"cve": "CVE-2015-2808",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-2808",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-2808",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-80769",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-2808",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-2808",
"trust": 0.8,
"value": "Medium"
},
{
"author": "VULHUB",
"id": "VHN-80769",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue. (plaintext-recovery attack) There is a vulnerability that can be executed. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 7u79-2.5.6-1~deb7u1. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 7u79-2.5.6-1~deb8u1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 7u79-2.5.6-1. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04779034\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04779034\nVersion: 2\n\nHPSBST03418 rev.2 - HP P6000 Command View Software, Remote Disclosure of\nInformation\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-09-15\nLast Updated: 2015-10-01\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerabilities have been identified with HP P6000\nCommand View Software . They are the SSLv3 vulnerability known as \"Padding\nOracle on Downgraded Legacy Encryption\" also known as \"POODLE\", and the RC4\nstream cipher vulnerability in SSL/TLS known as \"Bar Mitzvah\" which could be\nexploited remotely to allow disclosure of information. \n\nReferences:\n\nCVE-2014-3566 - \"POODLE\"\nCVE-2015-2808 - \"Bar Mitzvah\"\nSSRT102013\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP P6000 Command View Software v10.3.6 and earlier running on Windows and\nLinux\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has released the following software update to resolve the vulnerability in\nHP P6000 Command View Software. \n\nHP P6000 Command View Software v10.3.7\n\nThe HP P6000 Command View 10.3.7 software can be obtained at the HP Support\nCenter here: http://h20565.www2.hpe.com/portal/site/hpsc by signing into your\nHP Passport account. \nNote: A valid HP Passport account is required to access this software. For\nmore information about downloading this software, contact your HP\nrepresentative. \n\nHISTORY\nVersion:1 (rev.1) - 15 September 2015 Initial release\nVersion:2 (rev.2) - 1 October 2015 Added CVE-2015-2808, added documentation\non how to find the update. \n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Content-Disposition: inline\n\n==========================================================================Ubuntu Security Notice USN-2696-1\nJuly 30, 2015\n\nopenjdk-7 vulnerabilities\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenJDK 7. \n\nSoftware Description:\n- openjdk-7: Open Source Java implementation\n\nDetails:\n\nSeveral vulnerabilities were discovered in the OpenJDK JRE related to\ninformation disclosure, data integrity, and availability. An attacker\ncould exploit these to cause a denial of service or expose sensitive\ndata over the network. (CVE-2015-2590, CVE-2015-2628, CVE-2015-4731,\nCVE-2015-4732, CVE-2015-4733, CVE-2015-4760, CVE-2015-4748)\n\nSeveral vulnerabilities were discovered in the cryptographic components\nof the OpenJDK JRE. An attacker could exploit these to expose sensitive\ndata over the network. An attacker could exploit these to expose\nsensitive data over the network. A remote attacker could exploit\nthis to cause a denial of service. (CVE-2015-4749)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n icedtea-7-jre-jamvm 7u79-2.5.6-0ubuntu1.15.04.1\n openjdk-7-jdk 7u79-2.5.6-0ubuntu1.15.04.1\n openjdk-7-jre 7u79-2.5.6-0ubuntu1.15.04.1\n openjdk-7-jre-headless 7u79-2.5.6-0ubuntu1.15.04.1\n openjdk-7-jre-lib 7u79-2.5.6-0ubuntu1.15.04.1\n openjdk-7-jre-zero 7u79-2.5.6-0ubuntu1.15.04.1\n\nUbuntu 14.04 LTS:\n icedtea-7-jre-jamvm 7u79-2.5.6-0ubuntu1.14.04.1\n openjdk-7-jdk 7u79-2.5.6-0ubuntu1.14.04.1\n openjdk-7-jre 7u79-2.5.6-0ubuntu1.14.04.1\n openjdk-7-jre-headless 7u79-2.5.6-0ubuntu1.14.04.1\n openjdk-7-jre-lib 7u79-2.5.6-0ubuntu1.14.04.1\n openjdk-7-jre-zero 7u79-2.5.6-0ubuntu1.14.04.1\n\nThis update uses a new upstream release, which includes additional\nbug fixes. \n\n - The TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as \"Logjam\" could be exploited remotely to\nallow unauthorized modification. \nHP Integration Adaptor v9.12. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: java-1.6.0-openjdk security update\nAdvisory ID: RHSA-2015:1526-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1526.html\nIssue date: 2015-07-30\nCVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 \n CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 \n CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 \n CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 \n CVE-2015-4749 CVE-2015-4760 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.6.0-openjdk packages that fix multiple security issues are\nnow available for Red Hat Enterprise Linux 5, 6, and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, x86_64\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime\nEnvironment and the OpenJDK 6 Java Software Development Kit. \n\nMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI\ncomponents in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass Java sandbox restrictions. (CVE-2015-4760,\nCVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)\n\nA flaw was found in the way the Libraries component of OpenJDK verified\nOnline Certificate Status Protocol (OCSP) responses. An OCSP response with\nno nextUpdate date specified was incorrectly handled as having unlimited\nvalidity, possibly causing a revoked X.509 certificate to be interpreted as\nvalid. (CVE-2015-4748)\n\nIt was discovered that the JCE component in OpenJDK failed to use constant\ntime comparisons in multiple cases. An attacker could possibly use these\nflaws to disclose sensitive information by measuring the time used to\nperform operations using these non-constant time comparisons. \n(CVE-2015-2601)\n\nA flaw was found in the RC4 encryption algorithm. When using certain keys\nfor RC4 encryption, an attacker could obtain portions of the plain text\nfrom the cipher text without the knowledge of the encryption key. \n(CVE-2015-2808)\n\nNote: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by\ndefault to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug\n1207101, linked to in the References section, for additional details about\nthis change. \n\nA flaw was found in the way the TLS protocol composed the Diffie-Hellman\n(DH) key exchange. A man-in-the-middle attacker could use this flaw to\nforce the use of weak 512 bit export-grade keys during the key exchange,\nallowing them to decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenJDK to\nreject DH key sizes below 768 bits, which prevents sessions to be\ndowngraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,\nlinked to in the References section, for additional details about this\nchange. \n\nIt was discovered that the JNDI component in OpenJDK did not handle DNS\nresolutions correctly. An attacker able to trigger such DNS errors could\ncause a Java application using JNDI to consume memory and CPU time, and\npossibly block further DNS resolution. (CVE-2015-4749)\n\nMultiple information leak flaws were found in the JMX and 2D components in\nOpenJDK. An untrusted Java application or applet could use this flaw to\nbypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)\n\nA flaw was found in the way the JSSE component in OpenJDK performed X.509\ncertificate identity verification when establishing a TLS/SSL connection to\na host identified by an IP address. In certain cases, the certificate was\naccepted as valid if it was issued for a host name to which the IP address\nresolves rather than for the IP address. (CVE-2015-2625)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)\n1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)\n1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)\n1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)\n1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)\n1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)\n1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)\n1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)\n1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)\n1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)\n1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)\n1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm\n\nppc64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\n\ns390x:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.ppc64.rpm\n\ns390x:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.s390x.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-2590\nhttps://access.redhat.com/security/cve/CVE-2015-2601\nhttps://access.redhat.com/security/cve/CVE-2015-2621\nhttps://access.redhat.com/security/cve/CVE-2015-2625\nhttps://access.redhat.com/security/cve/CVE-2015-2628\nhttps://access.redhat.com/security/cve/CVE-2015-2632\nhttps://access.redhat.com/security/cve/CVE-2015-2808\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/cve/CVE-2015-4731\nhttps://access.redhat.com/security/cve/CVE-2015-4732\nhttps://access.redhat.com/security/cve/CVE-2015-4733\nhttps://access.redhat.com/security/cve/CVE-2015-4748\nhttps://access.redhat.com/security/cve/CVE-2015-4749\nhttps://access.redhat.com/security/cve/CVE-2015-4760\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVulvzXlSAg2UNWIIRAmaeAJoCxD34LErxdkOHHsYpS21hu8NJ7ACgnbxy\nAM58F212G/DZWyApoAfiS38=\n=UmAX\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 5) - i386, ppc, s390x, x86_64\n\n3. Further information\nabout these flaws can be found on the IBM Java Security alerts page, listed\nin the References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n606442 - CVE-2005-1080 jar: directory traversal vulnerability\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1210355 - CVE-2015-0478 OpenJDK: RSA implementation hardening (JCE, 8071726)\n1210829 - CVE-2015-0469 ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699)\n1211299 - CVE-2015-0477 OpenJDK: incorrect permissions check in resource loading (Beans, 8068320)\n1211504 - CVE-2015-0480 OpenJDK: jar directory traversal issues (Tools, 8064601)\n1211543 - CVE-2015-0488 OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720)\n1211768 - CVE-2015-0459 Oracle JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D)\n1211769 - CVE-2015-0491 Oracle JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D)\n1211771 - CVE-2015-0458 Oracle JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment)\n1219212 - CVE-2015-0192 IBM JDK: unspecified Java sandbox restrictions bypass\n1219215 - CVE-2015-1914 IBM JDK: unspecified partial Java sandbox restrictions bypass\n1219223 - CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK)\n\n6",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2808"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "PACKETSTORM",
"id": "132835"
},
{
"db": "PACKETSTORM",
"id": "133836"
},
{
"db": "PACKETSTORM",
"id": "132890"
},
{
"db": "PACKETSTORM",
"id": "132894"
},
{
"db": "PACKETSTORM",
"id": "133329"
},
{
"db": "PACKETSTORM",
"id": "133337"
},
{
"db": "PACKETSTORM",
"id": "132900"
},
{
"db": "PACKETSTORM",
"id": "132989"
},
{
"db": "PACKETSTORM",
"id": "131895"
},
{
"db": "PACKETSTORM",
"id": "132345"
},
{
"db": "PACKETSTORM",
"id": "132872"
}
],
"trust": 2.7
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-80769",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2808",
"trust": 3.8
},
{
"db": "BID",
"id": "91787",
"trust": 1.1
},
{
"db": "BID",
"id": "73684",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032788",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033737",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032734",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033432",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033071",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1036222",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032708",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032868",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032990",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033072",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032910",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032858",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032600",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032599",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1032707",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033386",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033415",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033431",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1033769",
"trust": 1.1
},
{
"db": "JUNIPER",
"id": "JSA10705",
"trust": 1.1
},
{
"db": "JUNIPER",
"id": "JSA10727",
"trust": 1.1
},
{
"db": "JUNIPER",
"id": "JSA10783",
"trust": 1.1
},
{
"db": "MCAFEE",
"id": "SB10163",
"trust": 1.1
},
{
"db": "ICS CERT",
"id": "ICSA-22-160-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95298925",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "132872",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "133337",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "132890",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "133329",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "132345",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "132592",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133330",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133392",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133336",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132891",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133391",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132753",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "137746",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "135172",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133344",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "136773",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133366",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "136248",
"trust": 0.1
},
{
"db": "CNNVD",
"id": "CNNVD-201503-654",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-80769",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132835",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "133836",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132894",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132900",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "132989",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "131895",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "PACKETSTORM",
"id": "132835"
},
{
"db": "PACKETSTORM",
"id": "133836"
},
{
"db": "PACKETSTORM",
"id": "132890"
},
{
"db": "PACKETSTORM",
"id": "132894"
},
{
"db": "PACKETSTORM",
"id": "133329"
},
{
"db": "PACKETSTORM",
"id": "133337"
},
{
"db": "PACKETSTORM",
"id": "132900"
},
{
"db": "PACKETSTORM",
"id": "132989"
},
{
"db": "PACKETSTORM",
"id": "131895"
},
{
"db": "PACKETSTORM",
"id": "132345"
},
{
"db": "PACKETSTORM",
"id": "132872"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"id": "VAR-201504-0247",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
}
],
"trust": 0.6702648333333333
},
"last_update_date": "2025-12-22T22:03:15.048000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "hitachi-sec-2017-109",
"trust": 0.8,
"url": "https://www.google.co.jp/chrome/browser/desktop/index.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-327",
"trust": 1.0
},
{
"problemtype": "Cryptographic problems (CWE-310) [NVD evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-310",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-mantin-bar-mitzvah-attack-breaking-ssl-with-13-year-old-rc4-weakness-wp.pdf"
},
{
"trust": 1.2,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1007.html"
},
{
"trust": 1.2,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1526.html"
},
{
"trust": 1.2,
"url": "http://www.ubuntu.com/usn/usn-2696-1"
},
{
"trust": 1.2,
"url": "http://www.ubuntu.com/usn/usn-2706-1"
},
{
"trust": 1.1,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71888"
},
{
"trust": 1.1,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71892"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/73684"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/91787"
},
{
"trust": 1.1,
"url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04779034"
},
{
"trust": 1.1,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640"
},
{
"trust": 1.1,
"url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565"
},
{
"trust": 1.1,
"url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015"
},
{
"trust": 1.1,
"url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769"
},
{
"trust": 1.1,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"trust": 1.1,
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"trust": 1.1,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773256"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04708650"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04711380"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05085988"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193347"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05289935"
},
{
"trust": 1.1,
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05336888"
},
{
"trust": 1.1,
"url": "https://kb.juniper.net/jsa10783"
},
{
"trust": 1.1,
"url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098709"
},
{
"trust": 1.1,
"url": "http://www.debian.org/security/2015/dsa-3316"
},
{
"trust": 1.1,
"url": "http://www.debian.org/security/2015/dsa-3339"
},
{
"trust": 1.1,
"url": "https://security.gentoo.org/glsa/201512-10"
},
{
"trust": 1.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04687922"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1006.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1020.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1021.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1091.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1228.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1229.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1230.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1241.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1242.html"
},
{
"trust": 1.1,
"url": "http://rhn.redhat.com/errata/rhsa-2015-1243.html"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032599"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032600"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032707"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032708"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032734"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032788"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032858"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032868"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032910"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032990"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033071"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033072"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033386"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033415"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033431"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033432"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033737"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1033769"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1036222"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"
},
{
"trust": 1.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2808"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143456209711959\u0026w=2"
},
{
"trust": 1.0,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10163"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144102017024820\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143818140118771\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144069189622016\u0026w=2"
},
{
"trust": 1.0,
"url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143817899717054\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144043644216842\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144104565600964\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143741441012338\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144060606031437\u0026w=2"
},
{
"trust": 1.0,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10727"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144060576831314\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144059660127919\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144059703728085\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144493176821532\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=144104533800819\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143817021313142\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=143629696317098\u0026w=2"
},
{
"trust": 1.0,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu95298925/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2808"
},
{
"trust": 0.8,
"url": "https://www.ipa.go.jp/security/ciadr/vul/20150715-jre.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150022.html"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-160-01"
},
{
"trust": 0.6,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.6,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4732"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2628"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4760"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2601"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2632"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2621"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2625"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2590"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4733"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4749"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4731"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-4748"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-2613"
},
{
"trust": 0.3,
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.3,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.3,
"url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0477"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0480"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0478"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0469"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0488"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.2,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2015-2808"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.1,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705"
},
{
"trust": 0.1,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10727"
},
{
"trust": 0.1,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10163"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143456209711959\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143629696317098\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143818140118771\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143817899717054\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143817021313142\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144060576831314\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144069189622016\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144104565600964\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144060606031437\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144102017024820\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144059660127919\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144059703728085\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144043644216842\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=143741441012338\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144104533800819\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=144493176821532\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8873"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0470"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0460"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://h20565.www2.hpe.com/portal/site/hpsc"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.14.04.1"
},
{
"trust": 0.1,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/logjam"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.15.04.1"
},
{
"trust": 0.1,
"url": "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4760"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2621"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2601"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4732"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4000"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2632"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4733"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4748"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4731"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2625"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-4749"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2590"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-2628"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/openjdk-6/6b36-1.13.8-0ubuntu1~12.04"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0458"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0480"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-1914"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0458"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0491"
},
{
"trust": 0.1,
"url": "https://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0491"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0478"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0192"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2005-1080"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2005-1080"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0138"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0138"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-0459"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0192"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0477"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0469"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0459"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-1914"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c4"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2015-0488"
},
{
"trust": 0.1,
"url": "https://softwaresupport.hp.com/group/softwaresupport/search-"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "PACKETSTORM",
"id": "132835"
},
{
"db": "PACKETSTORM",
"id": "133836"
},
{
"db": "PACKETSTORM",
"id": "132890"
},
{
"db": "PACKETSTORM",
"id": "132894"
},
{
"db": "PACKETSTORM",
"id": "133329"
},
{
"db": "PACKETSTORM",
"id": "133337"
},
{
"db": "PACKETSTORM",
"id": "132900"
},
{
"db": "PACKETSTORM",
"id": "132989"
},
{
"db": "PACKETSTORM",
"id": "131895"
},
{
"db": "PACKETSTORM",
"id": "132345"
},
{
"db": "PACKETSTORM",
"id": "132872"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-80769"
},
{
"db": "PACKETSTORM",
"id": "132835"
},
{
"db": "PACKETSTORM",
"id": "133836"
},
{
"db": "PACKETSTORM",
"id": "132890"
},
{
"db": "PACKETSTORM",
"id": "132894"
},
{
"db": "PACKETSTORM",
"id": "133329"
},
{
"db": "PACKETSTORM",
"id": "133337"
},
{
"db": "PACKETSTORM",
"id": "132900"
},
{
"db": "PACKETSTORM",
"id": "132989"
},
{
"db": "PACKETSTORM",
"id": "131895"
},
{
"db": "PACKETSTORM",
"id": "132345"
},
{
"db": "PACKETSTORM",
"id": "132872"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-80769"
},
{
"date": "2015-07-27T15:36:14",
"db": "PACKETSTORM",
"id": "132835"
},
{
"date": "2015-10-05T18:34:37",
"db": "PACKETSTORM",
"id": "133836"
},
{
"date": "2015-08-03T01:13:15",
"db": "PACKETSTORM",
"id": "132890"
},
{
"date": "2015-08-03T01:14:40",
"db": "PACKETSTORM",
"id": "132894"
},
{
"date": "2015-08-26T15:58:53",
"db": "PACKETSTORM",
"id": "133329"
},
{
"date": "2015-08-26T23:41:29",
"db": "PACKETSTORM",
"id": "133337"
},
{
"date": "2015-08-03T01:16:29",
"db": "PACKETSTORM",
"id": "132900"
},
{
"date": "2015-08-07T04:04:00",
"db": "PACKETSTORM",
"id": "132989"
},
{
"date": "2015-05-13T19:45:45",
"db": "PACKETSTORM",
"id": "131895"
},
{
"date": "2015-06-17T23:50:12",
"db": "PACKETSTORM",
"id": "132345"
},
{
"date": "2015-07-28T23:38:00",
"db": "PACKETSTORM",
"id": "132872"
},
{
"date": "2015-04-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"date": "2015-04-01T02:00:35.097000",
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-80769"
},
{
"date": "2022-06-13T05:54:00",
"db": "JVNDB",
"id": "JVNDB-2015-002044"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-2808"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "TLS\u00a0 Protocol and \u00a0SSL\u00a0 Used in the protocol \u00a0RC4\u00a0 Plaintext recovery attack vulnerability in algorithm to first byte of stream",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002044"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "info disclosure",
"sources": [
{
"db": "PACKETSTORM",
"id": "132894"
},
{
"db": "PACKETSTORM",
"id": "132989"
}
],
"trust": 0.2
}
}
VAR-201706-0237
Vulnerability from variot - Updated: 2025-04-20 23:36The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0237",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s2750ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5710hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5720hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s5700si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5700li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s5300si",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s5300li",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc500"
},
{
"model": "s2350ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700hi",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s6300ei",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00spc300"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00spc500"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2350ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2750ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700si",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5710hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700ei",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00spc300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r006c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5720hi v200r007c00spc500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2350ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2750ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700si_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5710hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5720hi_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700ei_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
]
},
"cve": "CVE-2015-3913",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-3913",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-33208",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-81874",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-3913",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-3913",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-3913",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-81874",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The IP stack in multiple Huawei Campus series switch models allows remote attackers to cause a denial of service (reboot) via a crafted ICMP request message. HuaweiS2300 is a switch device of Huawei (Huawei). IPstack is one of the transport protocols. IPstack in several Huawei products has a security vulnerability. The vulnerability stems from the failure of the packet processing module to correctly determine the length of the IP option. An attacker can use this vulnerability to create a board reset by using a special ICMP packet. The following versions are affected: Huawei S2300/S2700/S3300/S3700 V100R00600 Version, V100R006C03 Version, V100R006C05 Version; S5300EI/S5700EI/S5300SI/S5700SI V100R006C00 Version, V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300HI/S5700HI S6300EI/S6700EI /S5710HI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version; S5300LI/S5700LI/S2350EI/S2750EI V200R001C00SPC300 Version, V200R002C00SPC300 Version, V200R003C00SPC300 Version, V200R005C00SPC300 Version, V200R006C00SPC500 Version, V200R007C00SPC500 Version; S5720HI V200R006C00SPC500 Version, V200R007C00SPC500 Version; S7700/S9300/ S9700 V200R001C00SPC300, V200R002C00SPC300, V200R003C00SPC500, V200R005C00SPC300, V200R006C00SPC500, V200R007C00SPC500; S12700",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-3913"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-3913",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33208",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-81874",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"id": "VAR-201706-0237",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
}
],
"trust": 1.48522971
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
}
]
},
"last_update_date": "2025-04-20T23:36:54.009000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20150506-01-ICMP",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
},
{
"title": "Patches for various Huawei product input verification vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/105678"
},
{
"title": "Multiple Huawei Fixes for product input validation vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74793"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-427449.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3913"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-3913"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-427449"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"db": "VULHUB",
"id": "VHN-81874"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2017-06-08T21:29:00.377000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33208"
},
{
"date": "2017-06-22T00:00:00",
"db": "VULHUB",
"id": "VHN-81874"
},
{
"date": "2017-07-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007610"
},
{
"date": "2017-09-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-290"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-3913"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Series switch model IP Service operation disruption in the stack (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007610"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-290"
}
],
"trust": 0.6
}
}
VAR-201306-0209
Vulnerability from variot - Updated: 2025-04-11 23:19The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0209",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s2700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3500",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3900",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s5100",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s5600",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s7800",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "ar 18-1x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r0130"
},
{
"model": "ar 18-2x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r1712"
},
{
"model": "ar 18-3x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r0118"
},
{
"model": "s2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1631"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1632"
},
{
"model": "ar 28\\/46",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r0311"
},
{
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "ar 28/46",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r0311"
},
{
"model": "s8500",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "r1631 and r1632"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2000",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3000",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3900",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5600",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s8500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 1x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 2x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 3x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 19 29 49",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 28 46",
"version": "*"
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300hi",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3500",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3900",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5100",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5600",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s7800",
"version": null
},
{
"model": "r1631",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
},
{
"model": "r1632",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ar_18-1x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_18-2x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_18-3x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_28%2F46",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3900",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7800",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s8500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Felix Lindner of Recurity Labs GmbH",
"sources": [
{
"db": "BID",
"id": "60712"
}
],
"trust": 0.3
},
"cve": "CVE-2012-6570",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2012-6570",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-08072",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-59851",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-6570",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2012-6570",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-08072",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-406",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-59851",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "VULHUB",
"id": "VHN-59851"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. \nAttackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-6570"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "BID",
"id": "60712"
},
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-59851"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-6570",
"trust": 3.6
},
{
"db": "BID",
"id": "60712",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-08072",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007",
"trust": 0.8
},
{
"db": "IVD",
"id": "E44F6A90-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-59851",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "VULHUB",
"id": "VHN-59851"
},
{
"db": "BID",
"id": "60712"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"id": "VAR-201306-0209",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "VULHUB",
"id": "VHN-59851"
}
],
"trust": 1.5404509836363638
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
}
]
},
"last_update_date": "2025-04-11T23:19:31.893000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20120808-03-HTTP-Module",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
},
{
"title": "Huawei AR Router and Switch HTTP Module Header Field Handling Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/34802"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-59851"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6570"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6570"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "VULHUB",
"id": "VHN-59851"
},
{
"db": "BID",
"id": "60712"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"db": "VULHUB",
"id": "VHN-59851"
},
{
"db": "BID",
"id": "60712"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-59851"
},
{
"date": "2013-06-20T00:00:00",
"db": "BID",
"id": "60712"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"date": "2013-06-20T15:55:00.967000",
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08072"
},
{
"date": "2013-06-21T00:00:00",
"db": "VULHUB",
"id": "VHN-59851"
},
{
"date": "2015-03-19T08:38:00",
"db": "BID",
"id": "60712"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006007"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-406"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-6570"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei of AR Heap-based buffer overflow vulnerability in router and switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006007"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "e44f6a90-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-406"
}
],
"trust": 0.8
}
}
VAR-201306-0208
Vulnerability from variot - Updated: 2025-04-11 23:15Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0208",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3300",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3500",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3900",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s5100",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s5600",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s7800",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "ar 18-1x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r0130"
},
{
"model": "ar 18-2x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r1712"
},
{
"model": "s2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1631"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1632"
},
{
"model": "ar 28\\/46",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r0311"
},
{
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "ar 18-3x",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r0118"
},
{
"model": "ar 18-2x",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r0118"
},
{
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "ar 28/46",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r0311"
},
{
"model": "s8500",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "r1631 and r1632"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2000",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3000",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3900",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5600",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s8500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s8500",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s7800",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s5600",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s5100",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3900",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3500",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3000",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s2000",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar49",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar46",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar29",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar28",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar19",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-3x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-2x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-1x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 1x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 2x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 3x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 19 29 49",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 28 46",
"version": "*"
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300hi",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3500",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3900",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5100",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5600",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s7800",
"version": null
},
{
"model": "r1631",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
},
{
"model": "r1632",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "BID",
"id": "60708"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ar_18-1x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_18-2x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_28%2F46",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3900",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7800",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s8500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Felix Lindner of Recurity Labs GmbH",
"sources": [
{
"db": "BID",
"id": "60708"
}
],
"trust": 0.3
},
"cve": "CVE-2012-6569",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2012-6569",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CNVD-2013-08073",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "e42fb632-2352-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-59850",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-6569",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2012-6569",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-08073",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-405",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-59850",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "VULHUB",
"id": "VHN-59850"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. Huawei AR routers and Huawei S series switches are network devices of Huawei products. \nAttackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-6569"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "BID",
"id": "60708"
},
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-59850"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-6569",
"trust": 3.6
},
{
"db": "BID",
"id": "60708",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-08073",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006",
"trust": 0.8
},
{
"db": "IVD",
"id": "E42FB632-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-59850",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "VULHUB",
"id": "VHN-59850"
},
{
"db": "BID",
"id": "60708"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"id": "VAR-201306-0208",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "VULHUB",
"id": "VHN-59850"
}
],
"trust": 1.5404509836363638
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
}
]
},
"last_update_date": "2025-04-11T23:15:26.176000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20120808-02-HTTP-Module",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
},
{
"title": "Huawei AR Router and Switch HTTP Module Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/34801"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-59850"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6569"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6569"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "VULHUB",
"id": "VHN-59850"
},
{
"db": "BID",
"id": "60708"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"db": "VULHUB",
"id": "VHN-59850"
},
{
"db": "BID",
"id": "60708"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-59850"
},
{
"date": "2012-08-04T00:00:00",
"db": "BID",
"id": "60708"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"date": "2013-06-20T15:55:00.950000",
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08073"
},
{
"date": "2013-06-21T00:00:00",
"db": "VULHUB",
"id": "VHN-59850"
},
{
"date": "2012-08-04T00:00:00",
"db": "BID",
"id": "60708"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006006"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-405"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-6569"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei of AR Stack-based buffer overflow vulnerability in router and switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006006"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "e42fb632-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-405"
}
],
"trust": 0.8
}
}
VAR-201306-0210
Vulnerability from variot - Updated: 2025-04-11 23:09The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Conversation. An attacker can exploit this issue to gain unauthorized access to the affected device. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks. Predictable session ID value
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0210",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ar 18-1x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r0130"
},
{
"model": "ar 18-2x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r1712"
},
{
"model": "ar 18-3x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "r0118"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s5600",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s7800",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1631"
},
{
"model": "s5100",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r1632"
},
{
"model": "s3900",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2000",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s3000",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s3500",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s3900",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s5100",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "s5600",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "ar 28\\/46",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r0311"
},
{
"model": "s2000",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s3000",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "r6305"
},
{
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207 \\\\\\\\ k"
},
{
"model": "ar 28/46",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r0311 \\\\\\\\ k"
},
{
"model": "ar routers",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7800",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s8500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s8500",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s7800",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s5600",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s5100",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3900",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3500",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s3000",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "s2000",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar49",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar46",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar29",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar28",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar19",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-3x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-2x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "ar18-1x",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 1x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 2x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 18 3x",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 19 29 49",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ar 28 46",
"version": "*"
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s2700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3000",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3300hi",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3500",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3700",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s3900",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5100",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s5600",
"version": null
},
{
"model": "r6305",
"scope": null,
"trust": 0.2,
"vendor": "s7800",
"version": null
},
{
"model": "r1631",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
},
{
"model": "r1632",
"scope": null,
"trust": 0.2,
"vendor": "s8500",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "BID",
"id": "60713"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ar_18-1x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_18-2x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_18-3x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_28%2F46",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3900",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7800",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Felix Lindner of Recurity Labs GmbH",
"sources": [
{
"db": "BID",
"id": "60713"
}
],
"trust": 0.3
},
"cve": "CVE-2012-6571",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2012-6571",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-08071",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e444d314-2352-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-59852",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-6571",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2012-6571",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-08071",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-407",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-59852",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "VULHUB",
"id": "VHN-59852"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Conversation. \nAn attacker can exploit this issue to gain unauthorized access to the affected device. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks. Predictable session ID value",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-6571"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "BID",
"id": "60713"
},
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-59852"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-6571",
"trust": 3.6
},
{
"db": "BID",
"id": "60713",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-08071",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008",
"trust": 0.8
},
{
"db": "IVD",
"id": "E444D314-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-59852",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "VULHUB",
"id": "VHN-59852"
},
{
"db": "BID",
"id": "60713"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"id": "VAR-201306-0210",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "VULHUB",
"id": "VHN-59852"
}
],
"trust": 1.5404509836363638
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
}
]
},
"last_update_date": "2025-04-11T23:09:50.950000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20120808-01-HTTP-Module",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
},
{
"title": "Huawei AR router and switch HTTP module session ID predictable vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/34803"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-59852"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6571"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6571"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "VULHUB",
"id": "VHN-59852"
},
{
"db": "BID",
"id": "60713"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"db": "VULHUB",
"id": "VHN-59852"
},
{
"db": "BID",
"id": "60713"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "IVD",
"id": "e444d314-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-59852"
},
{
"date": "2012-08-04T00:00:00",
"db": "BID",
"id": "60713"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"date": "2013-06-20T15:55:00.983000",
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08071"
},
{
"date": "2013-09-02T00:00:00",
"db": "VULHUB",
"id": "VHN-59852"
},
{
"date": "2012-08-04T00:00:00",
"db": "BID",
"id": "60713"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006008"
},
{
"date": "2013-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-407"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-6571"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei of AR Vulnerability to hijack sessions in router and switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006008"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-407"
}
],
"trust": 0.6
}
}
VAR-201306-0006
Vulnerability from variot - Updated: 2025-04-11 23:05The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
from Crypto.Cipher import DES
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003c01spc100"
},
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"_id": null,
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00spc200"
},
{
"_id": null,
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"_id": null,
"model": "cx200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "cx300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "e200e-b",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e-c",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x1",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e-x2",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "eudemon1000",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon1000e-u",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon1000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "eudemon100e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007"
},
{
"_id": null,
"model": "eudemon200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon300",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon500",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"_id": null,
"model": "eudemon8000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003"
},
{
"_id": null,
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r005c00spc600"
},
{
"_id": null,
"model": "ne20",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005"
},
{
"_id": null,
"model": "ne40",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r007"
},
{
"_id": null,
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v800r002"
},
{
"_id": null,
"model": "ne80",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "nip100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip1000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "nip2100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "nip2200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "nip5100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s2700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"_id": null,
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"_id": null,
"model": "svn2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "svn3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002c02spc802b041"
},
{
"_id": null,
"model": "svn5000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "svn5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c01b019"
},
{
"_id": null,
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"_id": null,
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"_id": null,
"model": "cx600",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "e200x7",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200x5",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200x3",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-usg2100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "eudemon usg9500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"_id": null,
"model": "e200 usg2200",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "eudemon 8080e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemon usg9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne20e-x6",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"_id": null,
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "eudemon 8160e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "h3c ar\\",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2209"
},
{
"_id": null,
"model": "eudemon usg5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemon usg5500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "e200 usg5100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"_id": null,
"model": "e200e-x3",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x5",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e-x7",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e/usg2100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"_id": null,
"model": "e200e/usg2200",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "e200e/usg5100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"_id": null,
"model": "eudemon8080e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemon8160e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemonusg5300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"_id": null,
"model": "eudemonusg5500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"_id": null,
"model": "eudemonusg9300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"_id": null,
"model": "eudemonusg9500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"_id": null,
"model": "h3c ar",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "ar x9 series r2209"
},
{
"_id": null,
"model": "ne20e-x6",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"_id": null,
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"_id": null,
"model": "ne80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"_id": null,
"model": "s2700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"_id": null,
"model": "ne5000e v300r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne5000e v800r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ma5200g v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ma5200g v300r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne40e/80e",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "atn v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "atn v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne40/ne80 v300r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne20e-x6 v600r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ne20 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "me60",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx200/cx300 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v100r003c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v200r001c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "wlan ac v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"_id": null,
"model": "wlan ac v200r001c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"_id": null,
"model": "s9300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s7700",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300/s2700/s3 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s2300/s3300/s5300/s3300hi/ v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "s3300hi/s5300hi/s5306/s630 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar g3 v200r002c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "h3c ar ar series r2209",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c=x9"
},
{
"_id": null,
"model": "ar r2207",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "19/29/49\u003c="
},
{
"_id": null,
"model": "eudemon100e v200r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "eudemon200 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "eudemon300\u0026500\u00261000 v200r006c02",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon1000e-u/usg5300 v200r001",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon1000e-x/usg5500 v200r002",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "eudemon8000e-x/usg9500 v200r001c00spc600",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"_id": null,
"model": "svn5300 v100r001c01b019",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "svn2000\u00265000 series v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "svn3000 v100r002c02spc802b041",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "nip100/200/1000 v100r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "nip2100\u00262200\u00265100 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "quidway series",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "quidway series",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"_id": null,
"model": "me60 v600r002c07",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r003c00spc900",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar r2207",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
},
{
"_id": null,
"model": "me60 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "cx600 v600r003c00spca00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"_id": null,
"model": "ar r2209",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:acu",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_19%2F29%2F49",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ar_g3",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:atn",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cx600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-c",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-x1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-x2",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x3",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x5",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200x7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200e-usg2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200_usg2200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:e200_usg5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000e-u",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon1000e-x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon100e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon8000e-x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_8080e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_8160e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg5500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:eudemon_usg9500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:h3c_ar%28oem_in%29",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ma5200g",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:me60",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne20",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne20e-x6",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne40e%2F80e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne5000e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne80",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:ne80e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip2200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:nip5100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s2700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s3700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5300hi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5306",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s5700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s6700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s7700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:s9300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn5000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:svn5300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:wlan_ac_6605",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
}
]
},
"credits": {
"_id": null,
"data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
"sources": [
{
"db": "BID",
"id": "56510"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4960",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "LOW-MEDIUM",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 5.1,
"exploitability": "FUNCTIONAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "OFFICIAL FIX",
"reportConfidence": "CONFIRMED",
"severity": "MEDIUM",
"targetDistribution": "MEDIUM",
"trust": 0.8,
"userInteractionRequired": null,
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-08074",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-58241",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4960",
"trust": 1.6,
"value": "MEDIUM"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2012-4960",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-58241",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"description": {
"_id": null,
"data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "PACKETSTORM",
"id": "118054"
}
],
"trust": 3.87
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.kb.cert.org/vuls/id/948096",
"trust": 0.8,
"type": "unknown"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-58241",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2012-4960",
"trust": 3.4
},
{
"db": "CERT/CC",
"id": "VU#948096",
"trust": 2.7
},
{
"db": "BID",
"id": "56510",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU90202792",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "118054",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "38020",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-58241",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"id": "VAR-201306-0006",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
],
"trust": 2.165337808214286
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
}
]
},
"last_update_date": "2025-04-11T23:05:36.641000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Huawei-SA-20120827-01-CX600",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"title": "Huawei multiple product encryption is not a strong vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/34800"
},
{
"title": "Huawei patch for multiple product password encryption vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/25088"
},
{
"title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"trust": 1.9,
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90202792/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
},
{
"trust": 0.6,
"url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/56510"
},
{
"trust": 0.4,
"url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"db": "BID",
"id": "56510",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "118054",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"date": "2012-11-13T00:00:00",
"db": "BID",
"id": "56510",
"ident": null
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"date": "2012-11-13T23:22:55",
"db": "PACKETSTORM",
"id": "118054",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"date": "2013-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"date": "2013-06-20T15:55:00.897000",
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2013-10-03T00:00:00",
"db": "CERT/CC",
"id": "VU#948096",
"ident": null
},
{
"date": "2013-07-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074",
"ident": null
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517",
"ident": null
},
{
"date": "2013-08-22T00:00:00",
"db": "VULHUB",
"id": "VHN-58241",
"ident": null
},
{
"date": "2015-03-19T08:28:00",
"db": "BID",
"id": "56510",
"ident": null
},
{
"date": "2013-08-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"ident": null
},
{
"date": "2012-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280",
"ident": null
},
{
"date": "2021-11-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-4960",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
},
"title": {
"_id": null,
"data": "Huawei networking equipment weak password cipher",
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
}
}
VAR-201801-0087
Vulnerability from variot - Updated: 2024-11-23 22:59Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China's Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. An attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-0087",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s3700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9300e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc500"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00spc300"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00spc300"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc300"
},
{
"model": "s2300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9300e",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "campus series switches",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s2300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9300e_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "BID",
"id": "69302"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.9
},
"cve": "CVE-2014-5394",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2014-5394",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-05162",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-73335",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2014-5394",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-5394",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2014-5394",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-73335",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal. plural Huawei Campus A switch product contains an information disclosure vulnerability.Information may be obtained. Huawei Campus Series Switches is China\u0027s Huawei series of Campus switches. Huawei Campus Series Switches has a user enumeration vulnerability that allows an attacker to exploit a vulnerability to obtain a valid username and initiate further attacks. \nAn attacker may leverage this issue to harvest valid usernames, which may aid in further attacks. A remote attacker can use this vulnerability to log in to the server through SSH to guess whether a user name exists on the switch device based on the information returned by the server",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5394"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-5394",
"trust": 2.8
},
{
"db": "BID",
"id": "69302",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-05162",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-73335",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"id": "VAR-201801-0087",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
}
],
"trust": 1.307947909090909
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
}
]
},
"last_update_date": "2024-11-23T22:59:07.827000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20140820-01-Campus Switch",
"trust": 0.8,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"title": "Huawei Campus Series Switches User Enumeration Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/49234"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/69302"
},
{
"trust": 1.7,
"url": "http://www.huawei.com/us/psirt/security-advisories/2014/hw-362701"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97763"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5394"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-5394"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"db": "VULHUB",
"id": "VHN-73335"
},
{
"db": "BID",
"id": "69302"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-08T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2014-08-20T00:00:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2014-08-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"date": "2018-01-08T19:29:00.610000",
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-08-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-05162"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULHUB",
"id": "VHN-73335"
},
{
"date": "2015-03-19T09:24:00",
"db": "BID",
"id": "69302"
},
{
"date": "2018-02-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-008459"
},
{
"date": "2018-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201408-326"
},
{
"date": "2024-11-21T02:11:58.220000",
"db": "NVD",
"id": "CVE-2014-5394"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Campus Information disclosure vulnerability in switch products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-008459"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201408-326"
}
],
"trust": 0.6
}
}
VAR-201802-0527
Vulnerability from variot - Updated: 2024-11-23 22:59XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201802-0527",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ecns210 td",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v100r004c10spc101"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v100r004c10spc102"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v100r004c10spc200"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v100r004c10spc221"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v100r004c10spc400"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 2.4,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r004c10"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r004c10spc003"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r004c10spc100"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s3700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s3700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r006c05"
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc101",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc102",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc221",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc400",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ecns210_td_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s1700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vulnerability was discovered by Huawei internal testing.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
}
],
"trust": 0.6
},
"cve": "CVE-2017-15346",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-15346",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-38222",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-106159",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.0,
"id": "CVE-2017-15346",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-15346",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-15346",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-38222",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201712-061",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-106159",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2017-15346",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-15346",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-38222",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-106159",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-15346",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"id": "VAR-201802-0527",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
}
],
"trust": 1.6034556316438355
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
}
]
},
"last_update_date": "2024-11-23T22:59:06.717000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171201-01-xml",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en"
},
{
"title": "Huawei\u0027s various product XML parser denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/111809"
},
{
"title": "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76889"
},
{
"title": "Huawei Security Advisories: Security Advisory - Two DOS Vulnerabilities of XML Parser in Some Huawei Products",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=2e3897be411afe991825f2d2f5ab3ea5"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en"
},
{
"trust": 1.2,
"url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15346"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-15346"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn"
},
{
"trust": 0.6,
"url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200909-01-mbb-cn"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"db": "VULHUB",
"id": "VHN-106159"
},
{
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULHUB",
"id": "VHN-106159"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"date": "2017-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"date": "2018-02-15T16:29:01.047000",
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38222"
},
{
"date": "2018-02-24T00:00:00",
"db": "VULHUB",
"id": "VHN-106159"
},
{
"date": "2018-02-24T00:00:00",
"db": "VULMON",
"id": "CVE-2017-15346"
},
{
"date": "2018-03-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012436"
},
{
"date": "2020-10-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-061"
},
{
"date": "2024-11-21T03:14:30.757000",
"db": "NVD",
"id": "CVE-2017-15346"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability related to input validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012436"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-061"
}
],
"trust": 0.6
}
}
VAR-201802-0546
Vulnerability from variot - Updated: 2024-11-23 22:56XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China's Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201802-0546",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r004c10spc221"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r004c10spc102"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r004c10spc200"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r004c10spc400"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r004c10spc101"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r004c10spc003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r004c10spc100"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "ecns210 td",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r004c10"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r010c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "ecns210 td",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v100r006c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9300 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r005c05",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s600-e v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6300 v200r010c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc101",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc102",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc221",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ecns210 td v100r004c10spc400",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:ecns210_td_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s1700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei internal tester, The vulnerability was discovered by Huawei internal testing.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
}
],
"trust": 0.6
},
"cve": "CVE-2017-15333",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-15333",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-38223",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-106145",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.0,
"id": "CVE-2017-15333",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-15333",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-15333",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-38223",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201712-060",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-106145",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an enterprise-class switch product from China\u0027s Huawei company. XMLparser is one of the XML parsers. The vulnerability stems from the failure of the network system or product to properly validate the input data. The following products and versions are affected: Huawei S12700 V200R005C00 Version; S1700 V200R009C00 Version, V200R010C00 Version; S2300 V100R006C03 Version, V100R006C05 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version, V200R010C00 Version; S3300 V100R006C03 Version , V100R006C05 version; S3700 V100R006C03 version, V100R006C05 version; S5300, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-15333"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-15333",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-38223",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-106145",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"id": "VAR-201802-0546",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
}
],
"trust": 1.603455631643835
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
}
]
},
"last_update_date": "2024-11-23T22:56:00.654000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171201-01-xml",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en"
},
{
"title": "Patches for various Huawei product XML parser denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/111799"
},
{
"title": "Multiple Huawei product XML Remediation measures for resolver security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76888"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-106145"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.1,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-xml-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15333"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-15333"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171201-01-xml-cn"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20171201-01-xml-cn"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"db": "VULHUB",
"id": "VHN-106145"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULHUB",
"id": "VHN-106145"
},
{
"date": "2018-03-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"date": "2017-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"date": "2018-02-15T16:29:00.423000",
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38223"
},
{
"date": "2018-02-27T00:00:00",
"db": "VULHUB",
"id": "VHN-106145"
},
{
"date": "2018-03-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012479"
},
{
"date": "2019-05-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-060"
},
{
"date": "2024-11-21T03:14:29.053000",
"db": "NVD",
"id": "CVE-2017-15333"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Vulnerability related to input validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012479"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-060"
}
],
"trust": 0.6
}
}
VAR-201803-1329
Vulnerability from variot - Updated: 2024-11-23 22:38Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201803-1329",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc009t"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c01"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c01"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c10"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c20"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s1700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c01"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r006c03"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c02"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r006c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c02"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c06"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r009c00"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r008c00"
},
{
"model": "s9700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "s12700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r005c03"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c01"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00spc019t"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00b050"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r007c00"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "s12700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s1700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s2700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s3700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s6700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s9700",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r003c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r003c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r002c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r006c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r007c20",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r006c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s1700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r006c10",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r007c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r009c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s5700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s6700 v200r005c02",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r005c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s12700 v200r008c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r006c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r007c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700 v200r008c06",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s9700 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00b050",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00spc009t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2700 v200r007c00spc019t",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3700 v100r006c03",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:huawei:s12700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s1700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s2700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s3700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s5700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s6700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s7700_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:s9700_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
}
]
},
"cve": "CVE-2017-17141",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-17141",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2018-07349",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-108134",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2017-17141",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-17141",
"trust": 1.0,
"value": "LOW"
},
{
"author": "NVD",
"id": "CVE-2017-17141",
"trust": 0.8,
"value": "Low"
},
{
"author": "CNVD",
"id": "CNVD-2018-07349",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201712-302",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-108134",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei S12700 V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R007C20; V200R008C00; V200R009C00;S1700 V200R006C10; V200R009C00;S2700 V100R006C03; V200R003C00; V200R005C00; V200R006C00; V200R006C10; V200R007C00; V200R007C00B050; V200R007C00SPC009T; V200R007C00SPC019T; V200R008C00; V200R009C00;S3700 V100R006C03;S5700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R003C02; V200R005C00; V200R005C01; V200R005C02; V200R005C03; V200R006C00; V200R007C00; V200R008C00; V200R009C00;S6700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R005C01; V200R005C02; V200R008C00; V200R009C00;S7700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R006C01; V200R007C00; V200R007C01; V200R008C00; V200R008C06; V200R009C00;S9700 V200R001C00; V200R001C01; V200R002C00; V200R003C00; V200R005C00; V200R006C00; V200R007C00; V200R007C01; V200R008C00; V200R009C00 have a memory leak vulnerability. In some specific conditions, if attackers send specific malformed MPLS Service PING messages to the affected products, products do not release the memory when handling the packets. So successful exploit will result in memory leak of the affected products. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiS12700 is an intelligent routing switch of China Huawei. The following products and versions are affected: Huawei S12700 V200R005C00 Version, V200R006C00 Version, V200R007C00 Version, V200R007C01 Version, V200R007C20 Version, V200R008C00 Version, V200R009C00 Version; S1700 V200R006C10 Version, V200R009C00 Version; S2700 V100R006C03 Version, V200R003C00 Version, V200R005C00 Version, V200R006C00 Version, V200R006C10 Version, V200R007C00 Version, V200R007C00B050 Version, V200R007C00SPC009T Version, V200R007C00SPC019T Version, V200R008C00 Version, V200R009C00 Version; S3700 V100R006C03 Version; S5700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R003C02 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R005C03 Version, V200R006C00 Version, V200R007C00 Version, V200R008C00 Version, V200R009C00 Version; S6700 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R003C00 Version, V200R005C00 Version, V200R005C01 Version, V200R005C02 Version, V200R008C00 Version, V200R009C00 Version; S7700",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-17141"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-17141",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-07349",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-108134",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"id": "VAR-201803-1329",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
}
],
"trust": 1.594100404047619
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
}
]
},
"last_update_date": "2024-11-23T22:38:15.575000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20171206-01-mpls",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en"
},
{
"title": "Patch of several Huawei product memory leak vulnerabilities (CNVD-2018-07349)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/125245"
},
{
"title": "Multiple Huawei Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100236"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-772",
"trust": 1.1
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-108134"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-mpls-en"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17141"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-17141"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"db": "VULHUB",
"id": "VHN-108134"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"date": "2018-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-108134"
},
{
"date": "2018-04-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"date": "2017-12-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"date": "2018-03-05T19:29:00.737000",
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07349"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-108134"
},
{
"date": "2018-04-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-012890"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201712-302"
},
{
"date": "2024-11-21T03:17:34.063000",
"db": "NVD",
"id": "CVE-2017-17141"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Resource management vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-012890"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201712-302"
}
],
"trust": 0.6
}
}
CVE-2012-6571 (GCVE-0-2012-6571)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-09-16 21:08- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6571",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-16T21:08:50.739Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6570 (GCVE-0-2012-6570)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-09-16 23:46- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6570",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6570",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-16T23:46:14.672Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6569 (GCVE-0-2012-6569)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-09-17 02:36- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.340Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6569",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6569",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-17T02:36:51.575Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6571 (GCVE-0-2012-6571)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-09-16 21:08- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194371.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6571",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-16T21:08:50.739Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6569 (GCVE-0-2012-6569)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-09-17 02:36- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.340Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6569",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6569",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-17T02:36:51.575Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6570 (GCVE-0-2012-6570)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-09-16 23:46- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:01.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-20T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6570",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6570",
"datePublished": "2013-06-20T15:00:00Z",
"dateReserved": "2013-06-20T00:00:00Z",
"dateUpdated": "2024-09-16T23:46:14.672Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}