First published: Mon May 23 2016(Updated: )
Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei Eudemon USG9500 | ||
Huawei USG9500 firmware | =v500r001c00 | |
Huawei NGFW Module | ||
Huawei NGFW Module firmware | =v500r001c00 | |
Huawei Secospace USG6300 firmware | ||
Huawei USG6300E firmware | =v500r001c00 | |
Huawei Secospace USG6600 firmware | ||
Huawei Secospace USG6600 firmware | =v500r001c00 | |
Huawei Secospace USG6500 firmware | ||
Huawei Secospace USG6500 | =v500r001c00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4577 is classified as high due to the potential for remote code execution and denial of service.
To fix CVE-2016-4577, update the affected Huawei firewall software to version V500R001C20SPC100 or later.
CVE-2016-4577 affects the Huawei Secospace USG6300, USG6500, USG6600, and USG9500 series firewalls running specific firmware versions.
CVE-2016-4577 is a buffer overflow vulnerability in the Smart DNS functionality.
Yes, CVE-2016-4577 can be exploited remotely by sending a crafted packet to the affected device.