3 results (0.003 seconds)

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 0

An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 5.7.5.6; EMC Data Domain DD OS 6.0 family, versions prior to 6.0.2.9; EMC Data Domain DD OS 6.1 family, versions prior to 6.1.0.21; EMC Data Domain Virtual Edition 2.0 family, all versions; EMC Data Domain Virtual Edition 3.0 family, versions prior to 3.0 SP2 Update 1; and EMC Data Domain Virtual Edition 3.1 family, versions prior to 3.1 Update 2. EMC Data Domain DD OS contains a memory overflow vulnerability in SMBv1 which may potentially be exploited by an unauthenticated remote attacker. An attacker may completely shut down both the SMB service and active directory authentication. This may also allow remote code injection and execution. Se ha descubierto un problema en la familia de productos EMC Data Domain DD OS 5.7, en versiones anteriores a la 5.7.5.6; la familia de productos EMC Data Domain DD OS 6.0, en versiones anteriores a la 6.0.2.9; la familia de productos EMC Data Domain DD OS 6.1, en versiones anteriores a la 6.1.0.21; la familia de productos EMC Data Domain Virtual Edition 2.0 en todas sus versiones; la familia de productos EMC Data Domain Virtual Edition 3.0, en versiones anteriores a la 3.0 SP2 Update 1 y la familia de productos EMC Data Domain Virtual Edition 3.1, en versiones anteriores a la 3.1 Update 2. • http://seclists.org/fulldisclosure/2017/Dec/79 http://www.securityfocus.com/bid/102289 http://www.securitytracker.com/id/1040027 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

EMC Data Domain OS 5.5 before 5.5.4.0, 5.6 before 5.6.1.004, and 5.7 before 5.7.2.0 stores session identifiers of GUI users in a world-readable file, which allows local users to hijack arbitrary accounts via unspecified vectors. EMC Data Domain OS 5.5 en versiones anteriores a 5.5.4.0, 5.6 en versiones anteriores a 5.6.1.004 y 5.7 en versiones anteriores a 5.7.2.0 almacena identificadores de sesión de usuarios GUI en un archivo de lectura para todos, lo que permite a usuarios locales secuestrar cuentas arbitrarias a través de vectores no especificados. • http://seclists.org/bugtraq/2016/Jun/44 http://www.securitytracker.com/id/1036074 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

The command line administration interface in Data Domain OS before 4.0.3.6 allows remote authenticated users to execute arbitrary commands via shell metacharacters in certain arguments to various commands, as demonstrated by the interface argument to the (1) ifconfig and (2) ping commands. La linea de comando de la interafaz de administración en Data Domain OS anterior a 4.0.3.6 permite a usuarios remotos validados ejecutar comandos de su elección a través de los metacaracteres de la shell en ciertos argumentos en varios comandos, como se demostró por los argumentos del interfaz en los comandos (1) ifconfig y (2) ping. • http://osvdb.org/34537 http://secunia.com/advisories/24666 http://securityreason.com/securityalert/2516 http://www.securityfocus.com/archive/1/464085/100/0/threaded http://www.securityfocus.com/bid/23182 https://exchange.xforce.ibmcloud.com/vulnerabilities/33291 •