ID

VAR-201606-0130


CVE

CVE-2016-5234


TITLE

Huawei VP9600 Series and RSE6500 Video conferencing device software buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-003162

DESCRIPTION

Buffer overflow in Huawei VP9660, VP9650, and VP9630 multipoint control unit devices with software before V500R002C00SPC200 and RSE6500 videoconference devices with software before V500R002C00SPC100, when an unspecified service is enabled, allows remote attackers to execute arbitrary code via a crafted packet, aka HWPSIRT-2016-05054. Vendors have confirmed this vulnerability HWPSIRT-2016-05054 It is released as.A third party may be able to execute arbitrary code via a crafted packet. HUAWEIVP9660 and RSE6500 are the next-generation video conferencing terminal products of China Huawei. HUAWEIVP9660 and RSE6500 have a buffer overflow vulnerability in handling malformed messages. Remote attackers can exploit the vulnerability to send special requests to crash the system. Multiple Huawei Videoconference Products are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. The following products and versions are affected: HUAWEI VP9660 V200R001C01, V200R001C02, V200R001C30, and RSE6500 V100R001C00

Trust: 2.52

sources: NVD: CVE-2016-5234 // JVNDB: JVNDB-2016-003162 // CNVD: CNVD-2016-03933 // BID: 90978 // VULHUB: VHN-94053

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-03933

AFFECTED PRODUCTS

vendor:huaweimodel:vp9600 seriesscope:eqversion:v200r001c30

Trust: 1.6

vendor:huaweimodel:vp9600 seriesscope:eqversion:v200r001c01

Trust: 1.6

vendor:huaweimodel:vp9600 seriesscope:eqversion:v200r001c02

Trust: 1.6

vendor:huaweimodel:rse6500scope:eqversion:v100r001c00

Trust: 1.0

vendor:huaweimodel:rse6500scope: - version: -

Trust: 0.8

vendor:huaweimodel:rse6500scope:ltversion:v500r002c00spc100

Trust: 0.8

vendor:huaweimodel:vp9600 seriesscope:ltversion:v500r002c00spc200

Trust: 0.8

vendor:huaweimodel:vp9630scope: - version: -

Trust: 0.8

vendor:huaweimodel:vp9650scope: - version: -

Trust: 0.8

vendor:huaweimodel:vp9660scope: - version: -

Trust: 0.8

vendor:huaweimodel:vp9660 v200r001c01scope: - version: -

Trust: 0.6

vendor:huaweimodel:vp9660 v200r001c02scope: - version: -

Trust: 0.6

vendor:huaweimodel:vp9660 v200r001c30scope: - version: -

Trust: 0.6

vendor:huaweimodel:rse6500 v100r001c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:rse6500scope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-03933 // JVNDB: JVNDB-2016-003162 // CNNVD: CNNVD-201606-149 // NVD: CVE-2016-5234

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5234
value: HIGH

Trust: 1.0

NVD: CVE-2016-5234
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-03933
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201606-149
value: CRITICAL

Trust: 0.6

VULHUB: VHN-94053
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5234
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-03933
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-94053
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5234
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-03933 // VULHUB: VHN-94053 // JVNDB: JVNDB-2016-003162 // CNNVD: CNNVD-201606-149 // NVD: CVE-2016-5234

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-94053 // JVNDB: JVNDB-2016-003162 // NVD: CVE-2016-5234

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-149

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201606-149

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-003162

PATCH

title:huawei-sa-20160601-01-videoconferenceurl:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160601-01-videoconference-en

Trust: 0.8

title:HUAWEIVP9660 and RSE6500 malformed packet buffer overflow vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/77350

Trust: 0.6

title:HUAWEI VP9660 and RSE6500 Buffer Overflow Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62114

Trust: 0.6

sources: CNVD: CNVD-2016-03933 // JVNDB: JVNDB-2016-003162 // CNNVD: CNNVD-201606-149

EXTERNAL IDS

db:NVDid:CVE-2016-5234

Trust: 3.4

db:BIDid:90978

Trust: 1.4

db:JVNDBid:JVNDB-2016-003162

Trust: 0.8

db:CNNVDid:CNNVD-201606-149

Trust: 0.7

db:CNVDid:CNVD-2016-03933

Trust: 0.6

db:VULHUBid:VHN-94053

Trust: 0.1

sources: CNVD: CNVD-2016-03933 // VULHUB: VHN-94053 // BID: 90978 // JVNDB: JVNDB-2016-003162 // CNNVD: CNNVD-201606-149 // NVD: CVE-2016-5234

REFERENCES

url:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160601-01-videoconference-cn

Trust: 1.2

url:http://www.securityfocus.com/bid/90978

Trust: 1.1

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160601-01-videoconference-en

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5234

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5234

Trust: 0.8

sources: CNVD: CNVD-2016-03933 // VULHUB: VHN-94053 // JVNDB: JVNDB-2016-003162 // CNNVD: CNNVD-201606-149 // NVD: CVE-2016-5234

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 90978

SOURCES

db:CNVDid:CNVD-2016-03933
db:VULHUBid:VHN-94053
db:BIDid:90978
db:JVNDBid:JVNDB-2016-003162
db:CNNVDid:CNNVD-201606-149
db:NVDid:CVE-2016-5234

LAST UPDATE DATE

2024-11-23T22:30:58.835000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-03933date:2016-06-13T00:00:00
db:VULHUBid:VHN-94053date:2016-11-28T00:00:00
db:BIDid:90978date:2016-07-05T22:35:00
db:JVNDBid:JVNDB-2016-003162date:2016-06-16T00:00:00
db:CNNVDid:CNNVD-201606-149date:2016-06-14T00:00:00
db:NVDid:CVE-2016-5234date:2024-11-21T02:53:53.700

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-03933date:2016-06-13T00:00:00
db:VULHUBid:VHN-94053date:2016-06-13T00:00:00
db:BIDid:90978date:2016-06-01T00:00:00
db:JVNDBid:JVNDB-2016-003162date:2016-06-16T00:00:00
db:CNNVDid:CNNVD-201606-149date:2016-06-06T00:00:00
db:NVDid:CVE-2016-5234date:2016-06-13T14:59:09.290