Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.
References
Link | Resource |
---|---|
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171206-01-vpp-en | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2018-03-05 11:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-17131
Mitre link : CVE-2017-17131
JSON object : View
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
Products Affected
huawei
- vp9660
- te60
- vp9660_firmware
- rp200
- dp300_firmware
- te30_firmware
- te30
- te50_firmware
- rp200_firmware
- dp300
- te50
- te60_firmware