CVE-2017-15314
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/03/2018
Last modified:
03/10/2019
Description
Huawei DP300 V500R002C00, RP200 V500R002C00SPC200, V600R006C00, TE30 V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE40 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE50 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a memory leak vulnerability due to memory don't be released when the XML parser process some node fail. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:* | ||
| cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v100r001c10spc300:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v100r001c10spc500:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v100r001c10spc600:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v100r001c10spc700:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spc500:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:* | ||
| cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



