First published: Mon Oct 03 2016(Updated: )
Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei USG2100 | =v300r001c00 | |
Huawei USG2100 | =v300r001c10 | |
Huawei Usg2200 | =v300r001c00 | |
Huawei Usg2200 | =v300r001c10 | |
Huawei Usg5100 | =v300r001c00 | |
Huawei Usg5100 | =v300r001c10 | |
Huawei USG5500 | =v300r001c00 | |
Huawei USG5500 | =v300r001c10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.