Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-15350

Summary
Assigner-huawei
Assigner Org ID-25ac1063-e409-4190-8079-24548c77ea2e
Published At-15 Feb, 2018 | 16:00
Updated At-05 Aug, 2024 | 19:57
Rejected At-
Credits

The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:huawei
Assigner Org ID:25ac1063-e409-4190-8079-24548c77ea2e
Published At:15 Feb, 2018 | 16:00
Updated At:05 Aug, 2024 | 19:57
Rejected At:
▼CVE Numbering Authority (CNA)

The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.

Affected Products
Vendor
Huawei Technologies Co., Ltd.Huawei Technologies Co., Ltd.
Product
DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500,
Versions
Affected
  • DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R00 ...[truncated*]
Problem Types
TypeCWE IDDescription
textN/Abuffer overflow
Type: text
CWE ID: N/A
Description: buffer overflow
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en
x_refsource_CONFIRM
Hyperlink: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@huawei.com
Published At:15 Feb, 2018 | 16:29
Updated At:24 Feb, 2018 | 18:56

The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Huawei Technologies Co., Ltd.
huawei
>>dp300_firmware>>v500r002c00
cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>dp300>>-
cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v100r001c10
cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v100r001c20
cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v100r001c30
cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v500r001c00
cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v500r001c20
cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v500r001c30
cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module_firmware>>v500r001c50
cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ips_module>>-
cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module_firmware>>v100r001c10
cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module_firmware>>v100r001c20
cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module_firmware>>v100r001c30
cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module_firmware>>v500r001c00
cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module_firmware>>v500r001c20
cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>ngfw_module>>-
cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6300_firmware>>v500r001c00
cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6300_firmware>>v500r001c20
cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6300_firmware>>v500r001c30
cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6300_firmware>>v500r001c50
cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6300>>-
cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6600_firmware>>v500r001c00
cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6600_firmware>>v500r001c20
cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6600_firmware>>v500r001c30
cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6600_firmware>>v500r001c50
cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6600>>-
cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6800_firmware>>v500r001c50
cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>nip6800>>-
cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800-c_firmware>>v200r003c00
cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800-c_firmware>>v200r003c10
cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800-c>>-
cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>rp200_firmware>>v500r002c00
cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>rp200_firmware>>v600r006c00
cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>rp200>>-
cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5600_firmware>>v200r003c00
cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5600_firmware>>v200r003c10
cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5600>>-
cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800_firmware>>v200r003c00
cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800_firmware>>v200r003c10
cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>svn5800>>-
cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v100r001c10
cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v100r001c20
cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v100r001c30
cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v500r001c00
cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v500r001c20
cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v500r001c30
cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300_firmware>>v500r001c50
cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6300>>-
cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6500_firmware>>v100r001c10
cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*
Huawei Technologies Co., Ltd.
huawei
>>secospace_usg6500_firmware>>v100r001c20
cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-enpsirt@huawei.com
Vendor Advisory
Hyperlink: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en
Source: psirt@huawei.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found