Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-49f9-3p9f-vgr4

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.7

Описание

Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.

Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.

EPSS

Процентиль: 37%
0.00157
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-835

Связанные уязвимости

CVSS3: 5.7
nvd
почти 8 лет назад

Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.

EPSS

Процентиль: 37%
0.00157
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-835