ID

VAR-201605-0335


CVE

CVE-2016-4577


TITLE

plural Huawei Device product software Smart DNS Buffer overflow vulnerability in function

Trust: 0.8

sources: JVNDB: JVNDB-2016-002909

DESCRIPTION

Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters.". Multiple Huawei Products are prone to a buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the affected device. Failed exploit attempts will result in denial-of-service conditions. The Huawei NGFW Module and others are all firewall products of China's Huawei (Huawei). There are buffer overflow vulnerabilities in the Smart DNS function of several Huawei products. The following products and versions are affected: Huawei NGFW Module V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, and USG9500 V500R001C00

Trust: 1.98

sources: NVD: CVE-2016-4577 // JVNDB: JVNDB-2016-002909 // BID: 90532 // VULHUB: VHN-93396

AFFECTED PRODUCTS

vendor:huaweimodel:usg9500scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:ngfw modulescope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6500scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6300scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:secospace usg6600scope:eqversion:v500r001c00

Trust: 1.0

vendor:huaweimodel:ngfw modulescope: - version: -

Trust: 0.8

vendor:huaweimodel:ngfw modulescope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6300scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6300scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6500scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6500scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:secospace usg6600scope: - version: -

Trust: 0.8

vendor:huaweimodel:secospace usg6600scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:usg9500scope: - version: -

Trust: 0.8

vendor:huaweimodel:usg9500scope:ltversion:v500r001c20spc100

Trust: 0.8

vendor:huaweimodel:ngfw modulescope:eqversion: -

Trust: 0.6

vendor:huaweimodel:usg9500scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6500scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6600scope:eqversion: -

Trust: 0.6

vendor:huaweimodel:secospace usg6300scope:eqversion: -

Trust: 0.6

sources: JVNDB: JVNDB-2016-002909 // CNNVD: CNNVD-201605-578 // NVD: CVE-2016-4577

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4577
value: HIGH

Trust: 1.0

NVD: CVE-2016-4577
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201605-578
value: MEDIUM

Trust: 0.6

VULHUB: VHN-93396
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-4577
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-93396
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4577
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93396 // JVNDB: JVNDB-2016-002909 // CNNVD: CNNVD-201605-578 // NVD: CVE-2016-4577

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-93396 // JVNDB: JVNDB-2016-002909 // NVD: CVE-2016-4577

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201605-578

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201605-578

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002909

PATCH

title:Buffer Overflow Vulnerability in Huawei Several Products (huawei-sa-20160511-01-dns)url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en

Trust: 0.8

title:Multiple Huawei Product Buffer Overflow Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61891

Trust: 0.6

sources: JVNDB: JVNDB-2016-002909 // CNNVD: CNNVD-201605-578

EXTERNAL IDS

db:NVDid:CVE-2016-4577

Trust: 2.8

db:BIDid:90532

Trust: 1.4

db:JVNDBid:JVNDB-2016-002909

Trust: 0.8

db:CNNVDid:CNNVD-201605-578

Trust: 0.7

db:VULHUBid:VHN-93396

Trust: 0.1

sources: VULHUB: VHN-93396 // BID: 90532 // JVNDB: JVNDB-2016-002909 // CNNVD: CNNVD-201605-578 // NVD: CVE-2016-4577

REFERENCES

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en

Trust: 1.4

url:http://www.securityfocus.com/bid/90532

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4577

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4577

Trust: 0.8

url:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160511-01-dns-cn

Trust: 0.6

url:http://www.huawei.com

Trust: 0.3

sources: VULHUB: VHN-93396 // BID: 90532 // JVNDB: JVNDB-2016-002909 // CNNVD: CNNVD-201605-578 // NVD: CVE-2016-4577

CREDITS

Huawei

Trust: 0.6

sources: CNNVD: CNNVD-201605-578

SOURCES

db:VULHUBid:VHN-93396
db:BIDid:90532
db:JVNDBid:JVNDB-2016-002909
db:CNNVDid:CNNVD-201605-578
db:NVDid:CVE-2016-4577

LAST UPDATE DATE

2024-11-23T21:43:02.621000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93396date:2016-11-28T00:00:00
db:BIDid:90532date:2016-07-06T14:38:00
db:JVNDBid:JVNDB-2016-002909date:2016-05-27T00:00:00
db:CNNVDid:CNNVD-201605-578date:2016-05-24T00:00:00
db:NVDid:CVE-2016-4577date:2024-11-21T02:52:32.073

SOURCES RELEASE DATE

db:VULHUBid:VHN-93396date:2016-05-23T00:00:00
db:BIDid:90532date:2016-05-11T00:00:00
db:JVNDBid:JVNDB-2016-002909date:2016-05-27T00:00:00
db:CNNVDid:CNNVD-201605-578date:2016-05-23T00:00:00
db:NVDid:CVE-2016-4577date:2016-05-23T19:59:11.197