Huawei CloudEngine 12800 with software V100R002C00, V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00; CloudEngine 5800 with software V100R002C00, V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00; CloudEngine 6800 with software V100R002C00, V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00; CloudEngine 7800 with software V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00; CloudEngine 8800 with software V100R006C00; and Secospace USG6600 with software V500R001C00 allow remote unauthenticated attackers to craft specific IPFPM packets to trigger an integer overflow and cause the device to reset.
References
Link | Resource |
---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161123-01-vrp-en | Vendor Advisory |
http://www.securityfocus.com/bid/94504 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: huawei
Published: 2017-04-02T20:00:00
Updated: 2017-04-03T09:57:01
Reserved: 2016-10-18T00:00:00
Link: CVE-2016-8795
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-04-02T20:59:01.797
Modified: 2017-04-05T23:59:01.127
Link: CVE-2016-8795
JSON object: View
Redhat Information
No data.
CWE