ID

VAR-201605-0334


CVE

CVE-2016-4576


TITLE

plural Huawei Device product software Application Specific Packet Filtering Buffer overflow vulnerability in functionality

Trust: 0.8

sources: JVNDB: JVNDB-2016-002908

DESCRIPTION

Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters.". HuaweiIPSModule and other products are China's Huawei's intrusion prevention and intrusion detection products. A buffer overflow vulnerability exists in several Huawei products. An attacker could exploit a vulnerability that would result in a denial of service or arbitrary code by constructing a malformed message containing an illegal parameter. Multiple Huawei Products are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. The following Huawei products are affected: IPS Module NGFW Module NIP6300 NIP6600 Secospace USG6300 Secospace USG6500 Secospace USG6600 USG9500 Secospace AntiDDoS8000

Trust: 2.52

sources: NVD: CVE-2016-4576 // JVNDB: JVNDB-2016-002908 // CNVD: CNVD-2016-03569 // BID: 90530 // VULHUB: VHN-93395

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-03569

AFFECTED PRODUCTS

vendor:huaweimodel:nip6600scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace antiddos8000scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6300scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:usg9500scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6600scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6500scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:nip6300scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:ips modulescope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:ngfw modulescope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:ips modulescope: - version: -

Trust: 0.8

vendor:huaweimodel:ips modulescope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:ngfw modulescope: - version: -

Trust: 0.8

vendor:huaweimodel:ngfw modulescope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:nip6300scope: - version: -

Trust: 0.8

vendor:huaweimodel:nip6300scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:nip6600scope: - version: -

Trust: 0.8

vendor:huaweimodel:nip6600scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace antiddos8000scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace antiddos8000scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6300scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6300scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6500scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6500scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6600scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6600scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:usg9500scope: - version: -

Trust: 0.8

vendor:huaweimodel:usg9500scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace antiddos8000 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:usg9500 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:secospace usg6600 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:secospace usg6500 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:secospace usg6300 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:nip6600 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:nip6300 <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:ngfw module <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:ips module <v500r001c20spc100scope: - version: -

Trust: 0.6

vendor:huaweimodel:ngfw modulescope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace antiddos8000scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:usg9500scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:nip6600scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:nip6300scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6500scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6600scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6300scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:ips modulescope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-03569 // JVNDB: JVNDB-2016-002908 // CNNVD: CNNVD-201605-579 // NVD: CVE-2016-4576

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4576
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-4576
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2016-03569
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201605-579
value: HIGH

Trust: 0.6

VULHUB: VHN-93395
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-4576
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-03569
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-93395
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4576
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-03569 // VULHUB: VHN-93395 // JVNDB: JVNDB-2016-002908 // CNNVD: CNNVD-201605-579 // NVD: CVE-2016-4576

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-93395 // JVNDB: JVNDB-2016-002908 // NVD: CVE-2016-4576

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201605-579

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201605-579

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002908

PATCH

title:Buffer Overflow Vulnerability in Huawei Several Products (huawei-sa-20160511-01-aspf)url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en

Trust: 0.8

title:Patches for multiple Huawei product buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/76462

Trust: 0.6

title:Multiple Huawei Product Buffer Overflow Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61892

Trust: 0.6

sources: CNVD: CNVD-2016-03569 // JVNDB: JVNDB-2016-002908 // CNNVD: CNNVD-201605-579

EXTERNAL IDS

db:NVDid:CVE-2016-4576

Trust: 3.4

db:BIDid:90530

Trust: 1.4

db:JVNDBid:JVNDB-2016-002908

Trust: 0.8

db:CNNVDid:CNNVD-201605-579

Trust: 0.7

db:CNVDid:CNVD-2016-03569

Trust: 0.6

db:VULHUBid:VHN-93395

Trust: 0.1

sources: CNVD: CNVD-2016-03569 // VULHUB: VHN-93395 // BID: 90530 // JVNDB: JVNDB-2016-002908 // CNNVD: CNNVD-201605-579 // NVD: CVE-2016-4576

REFERENCES

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en

Trust: 1.4

url:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160511-01-aspf-cn

Trust: 1.2

url:http://www.securityfocus.com/bid/90530

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4576

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4576

Trust: 0.8

url:http://www.huawei.com

Trust: 0.3

sources: CNVD: CNVD-2016-03569 // VULHUB: VHN-93395 // BID: 90530 // JVNDB: JVNDB-2016-002908 // CNNVD: CNNVD-201605-579 // NVD: CVE-2016-4576

CREDITS

Huawei

Trust: 0.6

sources: CNNVD: CNNVD-201605-579

SOURCES

db:CNVDid:CNVD-2016-03569
db:VULHUBid:VHN-93395
db:BIDid:90530
db:JVNDBid:JVNDB-2016-002908
db:CNNVDid:CNNVD-201605-579
db:NVDid:CVE-2016-4576

LAST UPDATE DATE

2024-11-23T22:34:50.247000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-03569date:2016-05-25T00:00:00
db:VULHUBid:VHN-93395date:2016-11-28T00:00:00
db:BIDid:90530date:2016-07-06T14:48:00
db:JVNDBid:JVNDB-2016-002908date:2016-05-27T00:00:00
db:CNNVDid:CNNVD-201605-579date:2016-05-24T00:00:00
db:NVDid:CVE-2016-4576date:2024-11-21T02:52:31.913

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-03569date:2016-05-25T00:00:00
db:VULHUBid:VHN-93395date:2016-05-23T00:00:00
db:BIDid:90530date:2016-05-11T00:00:00
db:JVNDBid:JVNDB-2016-002908date:2016-05-27T00:00:00
db:CNNVDid:CNNVD-201605-579date:2016-05-23T00:00:00
db:NVDid:CVE-2016-4576date:2016-05-23T19:59:09.980