CNVD-2017-01158
Vulnerability from cnvd - Published: 2017-02-09
VLAI Severity ?
Title
EMC Data Domain OS命令注入漏洞
Description
EMC Data Domain OS(DD OS)是美国易安信(EMC)公司的一套重复数据消除操作系统。
EMC DD OS中存在命令注入漏洞。攻击者可利用该漏洞控制受影响的系统。
Severity
中
Patch Name
EMC Data Domain OS命令注入漏洞的补丁
Patch Description
EMC Data Domain OS(DD OS)是美国易安信(EMC)公司的一套重复数据消除操作系统。
EMC DD OS中存在命令注入漏洞。攻击者可利用该漏洞控制受影响的系统。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: http://www.emc.com/
Reference
http://www.securityfocus.com/archive/1/540059/30/0/threaded
http://www.securityfocus.com/bid/95829
Impacted products
| Name | ['EMC Data Domain OS 5.4', 'EMC Data Domain OS 5.5', 'EMC Data Domain OS 5.6', 'EMC Data Domain OS 5.7', 'EMC Data Domain OS 5.7.2.0', 'EMC Data Domain OS 5.7.1.0', 'EMC Data Domain OS 5.6.1.0', 'EMC Data Domain OS 5.5.4.0', 'EMC Data Domain OS 5.5.3.3'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "95829"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-8216"
}
},
"description": "EMC Data Domain OS\uff08DD OS\uff09\u662f\u7f8e\u56fd\u6613\u5b89\u4fe1\uff08EMC\uff09\u516c\u53f8\u7684\u4e00\u5957\u91cd\u590d\u6570\u636e\u6d88\u9664\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nEMC DD OS\u4e2d\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63a7\u5236\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u3002",
"discovererName": "Geoffrey Janjua from Northrop Grumman.",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://www.emc.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-01158",
"openTime": "2017-02-09",
"patchDescription": "EMC Data Domain OS\uff08DD OS\uff09\u662f\u7f8e\u56fd\u6613\u5b89\u4fe1\uff08EMC\uff09\u516c\u53f8\u7684\u4e00\u5957\u91cd\u590d\u6570\u636e\u6d88\u9664\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nEMC DD OS\u4e2d\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63a7\u5236\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "EMC Data Domain OS\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"EMC Data Domain OS 5.4",
"EMC Data Domain OS 5.5",
"EMC Data Domain OS 5.6",
"EMC Data Domain OS 5.7",
"EMC Data Domain OS 5.7.2.0",
"EMC Data Domain OS 5.7.1.0",
"EMC Data Domain OS 5.6.1.0",
"EMC Data Domain OS 5.5.4.0",
"EMC Data Domain OS 5.5.3.3"
]
},
"referenceLink": "http://www.securityfocus.com/archive/1/540059/30/0/threaded\r\nhttp://www.securityfocus.com/bid/95829",
"serverity": "\u4e2d",
"submitTime": "2017-02-06",
"title": "EMC Data Domain OS\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…