ID

VAR-201606-0456


CVE

CVE-2016-5365


TITLE

Huawei Honor WS851 Router software stack-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-003163

DESCRIPTION

Stack-based buffer overflow in Huawei Honor WS851 routers with software 1.1.21.1 and earlier allows remote attackers to execute arbitrary commands with root privileges via unspecified vectors, aka HWPSIRT-2016-05051. Huawei Honor WS851 The router software contains a stack-based buffer overflow vulnerability. Vendors have confirmed this vulnerability HWPSIRT-2016-05051 It is released as.By a third party root An arbitrary command may be executed with authority. HuaweiWS851 is a wireless router product from China's Huawei company. A security vulnerability exists in versions prior to HuaweiWS8511.1.21.1 that caused the program to fail to check parameters. An attacker could exploit this vulnerability to trigger a stack overflow, remotely gain root privileges, and execute the shell. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Honor WS851 Routers running firmware versions 1.1.21.1 and prior are vulnerable

Trust: 2.61

sources: NVD: CVE-2016-5365 // JVNDB: JVNDB-2016-003163 // CNVD: CNVD-2016-04034 // BID: 91210 // VULHUB: VHN-94184 // VULMON: CVE-2016-5365

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-04034

AFFECTED PRODUCTS

vendor:huaweimodel:honor ws851scope:lteversion:1.1.21.1

Trust: 1.0

vendor:huaweimodel:ws851scope: - version: -

Trust: 0.8

vendor:huaweimodel:ws851scope:lteversion:1.1.21.1

Trust: 0.8

vendor:huaweimodel:honor ws851scope:lteversion:<=1.1.21.1

Trust: 0.6

vendor:huaweimodel:honor ws851scope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-04034 // JVNDB: JVNDB-2016-003163 // NVD: CVE-2016-5365 // CNNVD: CNNVD-201606-305

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-5365
value: CRITICAL

Trust: 1.8

CNVD: CNVD-2016-04034
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201606-305
value: CRITICAL

Trust: 0.6

VULHUB: VHN-94184
value: HIGH

Trust: 0.1

VULMON: CVE-2016-5365
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: TRUE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2016-5365
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

CNVD: CNVD-2016-04034
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-94184
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2016-5365
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-04034 // VULHUB: VHN-94184 // VULMON: CVE-2016-5365 // JVNDB: JVNDB-2016-003163 // NVD: CVE-2016-5365 // CNNVD: CNNVD-201606-305

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-94184 // JVNDB: JVNDB-2016-003163 // NVD: CVE-2016-5365

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-305

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201606-305

CONFIGURATIONS

sources: NVD: CVE-2016-5365

PATCH

title:huawei-sa-20160607-01-honorrouter (HWPSIRT-2016-05051)url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160607-01-honorrouter-en

Trust: 0.8

title:HuaweiWS851 Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/77540

Trust: 0.6

title:Huawei WS851 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62255

Trust: 0.6

sources: CNVD: CNVD-2016-04034 // JVNDB: JVNDB-2016-003163 // CNNVD: CNNVD-201606-305

EXTERNAL IDS

db:NVDid:CVE-2016-5365

Trust: 3.5

db:JVNDBid:JVNDB-2016-003163

Trust: 0.8

db:CNNVDid:CNNVD-201606-305

Trust: 0.7

db:CNVDid:CNVD-2016-04034

Trust: 0.6

db:BIDid:91210

Trust: 0.4

db:VULHUBid:VHN-94184

Trust: 0.1

db:VULMONid:CVE-2016-5365

Trust: 0.1

sources: CNVD: CNVD-2016-04034 // VULHUB: VHN-94184 // VULMON: CVE-2016-5365 // BID: 91210 // JVNDB: JVNDB-2016-003163 // NVD: CVE-2016-5365 // CNNVD: CNNVD-201606-305

REFERENCES

url:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160607-01-honorrouter-cn

Trust: 1.2

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160607-01-honorrouter-en

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5365

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5365

Trust: 0.8

url:http://www.huawei.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://www.securityfocus.com/bid/91210

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-04034 // VULHUB: VHN-94184 // VULMON: CVE-2016-5365 // BID: 91210 // JVNDB: JVNDB-2016-003163 // NVD: CVE-2016-5365 // CNNVD: CNNVD-201606-305

CREDITS

Yang Kun

Trust: 0.6

sources: CNNVD: CNNVD-201606-305

SOURCES

db:CNVDid:CNVD-2016-04034
db:VULHUBid:VHN-94184
db:VULMONid:CVE-2016-5365
db:BIDid:91210
db:JVNDBid:JVNDB-2016-003163
db:NVDid:CVE-2016-5365
db:CNNVDid:CNNVD-201606-305

LAST UPDATE DATE

2023-12-18T13:19:40.997000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-04034date:2016-06-15T00:00:00
db:VULHUBid:VHN-94184date:2016-06-14T00:00:00
db:VULMONid:CVE-2016-5365date:2016-06-14T00:00:00
db:BIDid:91210date:2016-07-06T14:59:00
db:JVNDBid:JVNDB-2016-003163date:2016-06-16T00:00:00
db:NVDid:CVE-2016-5365date:2016-06-14T18:37:01.393
db:CNNVDid:CNNVD-201606-305date:2016-06-14T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-04034date:2016-06-15T00:00:00
db:VULHUBid:VHN-94184date:2016-06-14T00:00:00
db:VULMONid:CVE-2016-5365date:2016-06-14T00:00:00
db:BIDid:91210date:2016-06-07T00:00:00
db:JVNDBid:JVNDB-2016-003163date:2016-06-16T00:00:00
db:NVDid:CVE-2016-5365date:2016-06-14T14:59:03.743
db:CNNVDid:CNNVD-201606-305date:2016-06-14T00:00:00