Show plain JSON{"id": "CVE-2017-14385", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2017-12-20T23:29:00.250", "references": [{"url": "http://seclists.org/fulldisclosure/2017/Dec/79", "tags": ["Mailing List", "Third Party Advisory"], "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/bid/102289", "tags": ["Third Party Advisory", "VDB Entry"], "source": "security_alert@emc.com"}, {"url": "http://www.securitytracker.com/id/1040027", "tags": ["Third Party Advisory", "VDB Entry"], "source": "security_alert@emc.com"}, {"url": "http://seclists.org/fulldisclosure/2017/Dec/79", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/102289", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1040027", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 5.7.5.6; EMC Data Domain DD OS 6.0 family, versions prior to 6.0.2.9; EMC Data Domain DD OS 6.1 family, versions prior to 6.1.0.21; EMC Data Domain Virtual Edition 2.0 family, all versions; EMC Data Domain Virtual Edition 3.0 family, versions prior to 3.0 SP2 Update 1; and EMC Data Domain Virtual Edition 3.1 family, versions prior to 3.1 Update 2. EMC Data Domain DD OS contains a memory overflow vulnerability in SMBv1 which may potentially be exploited by an unauthenticated remote attacker. An attacker may completely shut down both the SMB service and active directory authentication. This may also allow remote code injection and execution."}, {"lang": "es", "value": "Se ha descubierto un problema en la familia de productos EMC Data Domain DD OS 5.7, en versiones anteriores a la 5.7.5.6; la familia de productos EMC Data Domain DD OS 6.0, en versiones anteriores a la 6.0.2.9; la familia de productos EMC Data Domain DD OS 6.1, en versiones anteriores a la 6.1.0.21; la familia de productos EMC Data Domain Virtual Edition 2.0 en todas sus versiones; la familia de productos EMC Data Domain Virtual Edition 3.0, en versiones anteriores a la 3.0 SP2 Update 1 y la familia de productos EMC Data Domain Virtual Edition 3.1, en versiones anteriores a la 3.1 Update 2. EMC Data Domain DD OS contiene una vulnerabilidad de desbordamiento de memoria en SMBv1, que podr\u00eda ser explotada por un atacante remoto no autenticado. Un atacante podr\u00eda cerrar por completo tanto la autenticaci\u00f3n del directorio activo como del servicio SMB. Esto tambi\u00e9n podr\u00eda permitir la inyecci\u00f3n y ejecuci\u00f3n remotas de c\u00f3digo."}], "lastModified": "2024-11-21T03:12:40.753", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:emc:data_domain:2.0:*:*:*:virtual:*:*:*", "vulnerable": true, "matchCriteriaId": "FE5EFDEC-E166-42F7-938D-7CBC49B5D361"}, {"criteria": "cpe:2.3:o:emc:data_domain:3.0:*:*:*:virtual:*:*:*", "vulnerable": true, "matchCriteriaId": "F7A08866-1116-44F9-BF45-61E70A87E81E"}, {"criteria": "cpe:2.3:o:emc:data_domain:3.0:sp2:*:*:virtual:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE9E614-362E-438F-A152-E68E658D499B"}, {"criteria": "cpe:2.3:o:emc:data_domain:3.1:update_2:*:*:virtual:*:*:*", "vulnerable": true, "matchCriteriaId": "2AA14F6E-2C1E-41AF-A45A-150F43D33F80"}, {"criteria": "cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDB5769-1D52-4AAC-8868-39B87BEDE34D", "versionEndExcluding": "5.7.5.6", "versionStartIncluding": "5.7"}, {"criteria": "cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3321CCE6-9D7F-47CC-AD21-C7D97C39F1EC", "versionEndExcluding": "6.0.2.9", "versionStartIncluding": "6.0"}, {"criteria": "cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F96D132F-05B7-4126-83A6-42A63AE3FA34", "versionEndExcluding": "6.1.0.21", "versionStartIncluding": "6.1"}], "operator": "OR"}]}], "sourceIdentifier": "security_alert@emc.com"}