ID

VAR-201606-0459


CVE

CVE-2016-5368


TITLE

Huawei AR3200 Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-003390

DESCRIPTION

Memory leak in Huawei AR3200 before V200R007C00SPC900 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted Multiprotocol Label Switching (MPLS) packets. Huawei AR3200 is an AR3200 series enterprise router product from China Huawei. The HuaweiAR3200 handles MPLS packets with a memory leak vulnerability. Huawei AR3200 router is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is fixed in: Huawei AR3200 router version V200R007C00SPC900. The following versions are affected: Huawei AR3200 V200R007C00, V200R005C32, and V200R005C20

Trust: 2.52

sources: NVD: CVE-2016-5368 // JVNDB: JVNDB-2016-003390 // CNVD: CNVD-2016-04482 // BID: 91557 // VULHUB: VHN-94187

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-04482

AFFECTED PRODUCTS

vendor:huaweimodel:ar3200scope:eqversion:v200r005c20

Trust: 1.0

vendor:huaweimodel:ar3200scope:eqversion:v200r007c00

Trust: 1.0

vendor:huaweimodel:ar3200scope:eqversion:v200r005c32

Trust: 1.0

vendor:huaweimodel:ar3200scope: - version: -

Trust: 0.8

vendor:huaweimodel:ar3200scope:ltversion:v200r007c00spc900

Trust: 0.8

vendor:huaweimodel:ar3200 v200r007c00scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar3200 v200r005c32scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar3200 v200r005c20scope: - version: -

Trust: 0.6

vendor:huaweimodel:ar3200scope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-04482 // JVNDB: JVNDB-2016-003390 // NVD: CVE-2016-5368 // CNNVD: CNNVD-201606-669

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-5368
value: HIGH

Trust: 1.8

CNVD: CNVD-2016-04482
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201606-669
value: HIGH

Trust: 0.6

VULHUB: VHN-94187
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2016-5368
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-04482
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-94187
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: CVE-2016-5368
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-04482 // VULHUB: VHN-94187 // JVNDB: JVNDB-2016-003390 // NVD: CVE-2016-5368 // CNNVD: CNNVD-201606-669

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-94187 // JVNDB: JVNDB-2016-003390 // NVD: CVE-2016-5368

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-669

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201606-669

CONFIGURATIONS

sources: NVD: CVE-2016-5368

PATCH

title:huawei-sa-20160608-01-mplsurl:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en

Trust: 0.8

title:HuaweiAR3200 MPLS Memory Leak Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/78558

Trust: 0.6

title:Huawei AR3200 Repair measures for memory leaksurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62578

Trust: 0.6

sources: CNVD: CNVD-2016-04482 // JVNDB: JVNDB-2016-003390 // CNNVD: CNNVD-201606-669

EXTERNAL IDS

db:NVDid:CVE-2016-5368

Trust: 3.4

db:BIDid:91557

Trust: 1.4

db:JVNDBid:JVNDB-2016-003390

Trust: 0.8

db:CNNVDid:CNNVD-201606-669

Trust: 0.7

db:CNVDid:CNVD-2016-04482

Trust: 0.6

db:VULHUBid:VHN-94187

Trust: 0.1

sources: CNVD: CNVD-2016-04482 // VULHUB: VHN-94187 // BID: 91557 // JVNDB: JVNDB-2016-003390 // NVD: CVE-2016-5368 // CNNVD: CNNVD-201606-669

REFERENCES

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160608-01-mpls-en

Trust: 2.3

url:http://www.securityfocus.com/bid/91557

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5368

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5368

Trust: 0.8

url:http://www.huawei.com/

Trust: 0.3

sources: CNVD: CNVD-2016-04482 // VULHUB: VHN-94187 // BID: 91557 // JVNDB: JVNDB-2016-003390 // NVD: CVE-2016-5368 // CNNVD: CNNVD-201606-669

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 91557

SOURCES

db:CNVDid:CNVD-2016-04482
db:VULHUBid:VHN-94187
db:BIDid:91557
db:JVNDBid:JVNDB-2016-003390
db:NVDid:CVE-2016-5368
db:CNNVDid:CNNVD-201606-669

LAST UPDATE DATE

2023-12-18T13:39:10.791000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-04482date:2016-07-05T00:00:00
db:VULHUBid:VHN-94187date:2016-11-28T00:00:00
db:BIDid:91557date:2016-06-08T00:00:00
db:JVNDBid:JVNDB-2016-003390date:2016-07-04T00:00:00
db:NVDid:CVE-2016-5368date:2016-11-28T20:24:55.250
db:CNNVDid:CNNVD-201606-669date:2016-07-01T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-04482date:2016-07-05T00:00:00
db:VULHUBid:VHN-94187date:2016-06-30T00:00:00
db:BIDid:91557date:2016-06-08T00:00:00
db:JVNDBid:JVNDB-2016-003390date:2016-07-04T00:00:00
db:NVDid:CVE-2016-5368date:2016-06-30T16:59:09.133
db:CNNVDid:CNNVD-201606-669date:2016-06-30T00:00:00