mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
69 lines
2.2 KiB
JSON
69 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "psirt@huawei.com",
|
|
"ID" : "CVE-2017-17221",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "eSpace 7950; eSpace 8950",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "eSpace 7950 V200R003C30"
|
|
},
|
|
{
|
|
"version_value" : "eSpace 8950 V200R003C00"
|
|
},
|
|
{
|
|
"version_value" : "V200R003C30"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Huawei Technologies Co., Ltd."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Import Signal Tone function in Huawei eSpace 7950 V200R003C30; eSpace 8950 V200R003C00; V200R003C30 has a remote code execution vulnerability. An authenticated, remote attacker can craft and send the packets to the affected products after the Signal Tone is uploaded. Due to insufficient verification of the packets, this could be exploited to execute arbitrary code."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "remote code execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-01-espace-en",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-01-espace-en"
|
|
}
|
|
]
|
|
}
|
|
}
|