CNVD-2017-01880

Vulnerability from cnvd - Published: 2017-02-24
VLAI Severity ?
Title
EMC RecoverPoint SSL Stripping安全绕过漏洞
Description
EMC RecoverPoint是一套灾难恢复和数据保护软件,EMC RecoverPoint for Virtual Machines(VMs)是一套面向VMware环境的灾难恢复解决方案。 EMC RecoverPoint SSL Stripping安全绕过漏洞。允许攻击者执行中间人攻击并获取访问到敏感信息的权限,导致进一步攻击。
Severity
Patch Name
EMC RecoverPoint SSL Stripping安全绕过漏洞的补丁
Patch Description
EMC RecoverPoint是一套灾难恢复和数据保护软件,EMC RecoverPoint for Virtual Machines(VMs)是一套面向VMware环境的灾难恢复解决方案。 EMC RecoverPoint SSL Stripping安全绕过漏洞。允许攻击者执行中间人攻击并获取访问到敏感信息的权限,导致进一步攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://store.emc.com/en-us/Solve-For/STORAGE-PRODUCTS/Dell-EMC-RecoverPoint/p/EMC-RecoverPoint?productCode=&fromPage=PVP

Reference
http://www.securityfocus.com/bid/96156
Impacted products
Name
['DELL EMC RecoverPoint for Virtual Machines 4.3.1.4', 'DELL EMC RecoverPoint for Virtual Machines 4.0', 'DELL EMC RecoverPoint 4.4.1.1', 'DELL EMC RecoverPoint 4.4.1.0']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "96156"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-6650",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6650"
    }
  },
  "description": "EMC RecoverPoint\u662f\u4e00\u5957\u707e\u96be\u6062\u590d\u548c\u6570\u636e\u4fdd\u62a4\u8f6f\u4ef6,EMC RecoverPoint for Virtual Machines\uff08VMs\uff09\u662f\u4e00\u5957\u9762\u5411VMware\u73af\u5883\u7684\u707e\u96be\u6062\u590d\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nEMC RecoverPoint SSL Stripping\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u6267\u884c\u4e2d\u95f4\u4eba\u653b\u51fb\u5e76\u83b7\u53d6\u8bbf\u95ee\u5230\u654f\u611f\u4fe1\u606f\u7684\u6743\u9650\uff0c\u5bfc\u81f4\u8fdb\u4e00\u6b65\u653b\u51fb\u3002",
  "discovererName": "Mike Erman, Jack Baker and Joshua Burbrink from Northrop Grumman",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://store.emc.com/en-us/Solve-For/STORAGE-PRODUCTS/Dell-EMC-RecoverPoint/p/EMC-RecoverPoint?productCode=\u0026fromPage=PVP",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-01880",
  "openTime": "2017-02-24",
  "patchDescription": "EMC RecoverPoint\u662f\u4e00\u5957\u707e\u96be\u6062\u590d\u548c\u6570\u636e\u4fdd\u62a4\u8f6f\u4ef6,EMC RecoverPoint for Virtual Machines\uff08VMs\uff09\u662f\u4e00\u5957\u9762\u5411VMware\u73af\u5883\u7684\u707e\u96be\u6062\u590d\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nEMC RecoverPoint SSL Stripping\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u6267\u884c\u4e2d\u95f4\u4eba\u653b\u51fb\u5e76\u83b7\u53d6\u8bbf\u95ee\u5230\u654f\u611f\u4fe1\u606f\u7684\u6743\u9650\uff0c\u5bfc\u81f4\u8fdb\u4e00\u6b65\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "EMC RecoverPoint SSL Stripping\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "DELL EMC RecoverPoint for Virtual Machines 4.3.1.4",
      "DELL EMC RecoverPoint for Virtual Machines  4.0",
      "DELL EMC RecoverPoint 4.4.1.1",
      "DELL EMC RecoverPoint  4.4.1.0"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/96156",
  "serverity": "\u4e2d",
  "submitTime": "2017-02-17",
  "title": "EMC RecoverPoint SSL Stripping\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…