#VU23629 Buffer overflow in Huawei Server applications


Published: 2019-12-17

Vulnerability identifier: #VU23629

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5258

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Huawei AP2000
Hardware solutions / Routers & switches, VoIP, GSM, etc
Huawei IPS Module
Server applications / IDS/IPS systems, Firewalls and proxy servers
Huawei NIP6300
Server applications / IDS/IPS systems, Firewalls and proxy servers
Huawei NIP6600
Server applications / IDS/IPS systems, Firewalls and proxy servers
Huawei NIP6800
Server applications / IDS/IPS systems, Firewalls and proxy servers
Huawei Secospace AntiDDoS8000
Server applications / IDS/IPS systems, Firewalls and proxy servers
Huawei NGFW Module
Server applications / Other server solutions
Huawei SVN5600
Server applications / Other server solutions
Huawei SVN5800
Server applications / Other server solutions
Huawei SVN5800-C
Server applications / Other server solutions
Huawei S5700
Hardware solutions / Routers for home users
Huawei SeMG9811
Other software / Other software solutions
Huawei Secospace USG6300
Server applications / Server solutions for antivurus protection
Huawei Secospace USG6500
Server applications / Server solutions for antivurus protection
Huawei Secospace USG6600
Server applications / Server solutions for antivurus protection
Huawei USG6000V
Server applications / Remote management servers, RDP, SSH
Huawei eSpace U1981
Server applications / Remote management servers, RDP, SSH

Vendor: Huawei

Description

The vulnerability allows a local attacker to cause the affected board abnormal.

The vulnerability exists due to a boundary error when processing a crafted message. A local attacker who logs in to the board can send specially crafted messages from the internal network port or tamper with inter-process message packets, trigger memory corruption and cause the affected board abnormal.


Mitigation
Install updates from vendor's website.

Vulnerable software versions

Huawei AP2000: V200R005C30 - V200R009C00

Huawei IPS Module: V500R001C00SPC300 - V500R005C00

Huawei NGFW Module: V500R001C00SPC300 - V500R005C00

Huawei NIP6300: V500R001C00SPC300 - V500R005C00

Huawei NIP6600: V500R001C00SPC300 - V500R005C00

Huawei NIP6800: V500R001C50 - V500R005C00

Huawei S5700: V200R005C03

Huawei SVN5600: V200R003C00SPC100

Huawei SVN5800: V200R003C00SPC100

Huawei SVN5800-C: V200R003C00SPC100

Huawei SeMG9811: V500R002C20 - V500R005C00

Huawei Secospace AntiDDoS8000: V500R001C00 - V500R005C00SPC100

Huawei Secospace USG6300: V100R001C20SPC100 - V500R005C00

Huawei Secospace USG6500: V100R001C20SPC100 - V500R005C00

Huawei Secospace USG6600: V100R001C00SPC200 - V500R005C00SPC102

Huawei USG6000V: V500R001C10 - V500R005C00SPC100

Huawei eSpace U1981: V200R003C50SPC700


External links
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability