2 results (0.008 seconds)

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 0

An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 5.7.5.6; EMC Data Domain DD OS 6.0 family, versions prior to 6.0.2.9; EMC Data Domain DD OS 6.1 family, versions prior to 6.1.0.21; EMC Data Domain Virtual Edition 2.0 family, all versions; EMC Data Domain Virtual Edition 3.0 family, versions prior to 3.0 SP2 Update 1; and EMC Data Domain Virtual Edition 3.1 family, versions prior to 3.1 Update 2. EMC Data Domain DD OS contains a memory overflow vulnerability in SMBv1 which may potentially be exploited by an unauthenticated remote attacker. An attacker may completely shut down both the SMB service and active directory authentication. This may also allow remote code injection and execution. Se ha descubierto un problema en la familia de productos EMC Data Domain DD OS 5.7, en versiones anteriores a la 5.7.5.6; la familia de productos EMC Data Domain DD OS 6.0, en versiones anteriores a la 6.0.2.9; la familia de productos EMC Data Domain DD OS 6.1, en versiones anteriores a la 6.1.0.21; la familia de productos EMC Data Domain Virtual Edition 2.0 en todas sus versiones; la familia de productos EMC Data Domain Virtual Edition 3.0, en versiones anteriores a la 3.0 SP2 Update 1 y la familia de productos EMC Data Domain Virtual Edition 3.1, en versiones anteriores a la 3.1 Update 2. • http://seclists.org/fulldisclosure/2017/Dec/79 http://www.securityfocus.com/bid/102289 http://www.securitytracker.com/id/1040027 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

EMC Data Domain OS 5.5 before 5.5.4.0, 5.6 before 5.6.1.004, and 5.7 before 5.7.2.0 stores session identifiers of GUI users in a world-readable file, which allows local users to hijack arbitrary accounts via unspecified vectors. EMC Data Domain OS 5.5 en versiones anteriores a 5.5.4.0, 5.6 en versiones anteriores a 5.6.1.004 y 5.7 en versiones anteriores a 5.7.2.0 almacena identificadores de sesión de usuarios GUI en un archivo de lectura para todos, lo que permite a usuarios locales secuestrar cuentas arbitrarias a través de vectores no especificados. • http://seclists.org/bugtraq/2016/Jun/44 http://www.securitytracker.com/id/1036074 • CWE-264: Permissions, Privileges, and Access Controls •