FKIE_CVE-2017-14328
Vulnerability from fkie_nvd - Published: 2017-10-23 08:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
Extreme EXOS 15.7, 16.x, 21.x, and 22.x allows remote attackers to trigger a buffer overflow leading to a reboot.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://extremeportal.force.com/ExtrArticleDetail?n=000017765 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://extremeportal.force.com/ExtrArticleDetail?n=000017765 | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "10A3F12F-B2C4-430C-A17C-1D7E644DA1EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A283E599-F0C2-4BD2-8399-CA585FEB70DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "D896B881-7A90-4050-B5F0-6659AE9D6E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.2:patch1-1:*:*:*:*:*:*",
"matchCriteriaId": "768DEBAD-D270-4B30-AAF2-FDE52003EA45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.2:patch1-4:*:*:*:*:*:*",
"matchCriteriaId": "023233F6-776E-4576-AFCF-34C0B3D3DE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:-:*:*:*:*:*:*",
"matchCriteriaId": "B169334E-EFB5-42C1-B667-F41A8FD41318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-11:*:*:*:*:*:*",
"matchCriteriaId": "AB232698-5890-4062-8D00-2F4463700C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "DC13DCF8-2CBA-490B-A318-517E0E834AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-4:*:*:*:*:*:*",
"matchCriteriaId": "B5228883-019A-4D33-A86C-2851F9FE64B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "73231113-B85E-49F8-B9C6-ED3F9ABD3108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-8:*:*:*:*:*:*",
"matchCriteriaId": "1D4731C6-2BAA-44C6-8547-67CCC67AF4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.3:patch1-9:*:*:*:*:*:*",
"matchCriteriaId": "791274A9-9FA2-464F-9F16-4D58E7932856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "ECAA9453-ECBE-430D-BDD5-43CBF4CDF68D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.4:patch1-10:*:*:*:*:*:*",
"matchCriteriaId": "E0207BA0-1339-4F13-931B-65B384D47E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.4:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "ECBA3ADC-0B9D-4AD9-9DCC-57772648C427",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.4:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "6C7A8383-3923-4895-A357-8EF38DFE2E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.4:patch1-9:*:*:*:*:*:*",
"matchCriteriaId": "DF2C3EED-DC34-445A-ADF2-E8676273C365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6CDD7F-BFDE-4441-9AFD-151D847A3A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46FA8F0C-C560-4E34-BBA1-3DB8793458A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A0643834-1CDC-4E2C-BAF0-CAE0285787ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.2:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "C39B6A31-E6E6-431F-942B-3A004176A4F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:-:*:*:*:*:*:*",
"matchCriteriaId": "F0438D0D-1F11-4A24-B806-DA1B3BA5F015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:patch1-12:*:*:*:*:*:*",
"matchCriteriaId": "5A307526-278F-4BEE-AD49-FFB602AE4B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:patch1-13:*:*:*:*:*:*",
"matchCriteriaId": "AE4F38DF-D490-483B-A17A-E9E077C7F492",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:patch1-14:*:*:*:*:*:*",
"matchCriteriaId": "8BE3E7B8-C6CB-4CF5-8A3B-15EBF9A0AEBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "2B21A0EA-C128-4C0A-91C1-5AAC53859DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.3:patch1-6:*:*:*:*:*:*",
"matchCriteriaId": "5EAC6A52-4715-43A6-920D-A041380B8C54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.4:-:*:*:*:*:*:*",
"matchCriteriaId": "CE40F69C-D695-40AE-93AB-1F6F601E986A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.4:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "5CBF68E1-F7E4-4420-B7BF-168B0629D43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.4:patch1-5:*:*:*:*:*:*",
"matchCriteriaId": "1549E41A-7910-4B0A-B7DF-5F7B28CBE3E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.4:patch1-6:*:*:*:*:*:*",
"matchCriteriaId": "12A50E84-35D1-4572-8E3E-AC784BAD0CE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.4:patch1-8:*:*:*:*:*:*",
"matchCriteriaId": "A6C4DFBF-3050-4135-B16D-FFD7EAA701F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:-:*:*:*:*:*:*",
"matchCriteriaId": "A5F457CF-992D-495C-8447-87F9EE49E6FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-10:*:*:*:*:*:*",
"matchCriteriaId": "A7C533D3-EE52-481C-BCFB-B0F6CD03FD9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-11:*:*:*:*:*:*",
"matchCriteriaId": "9D276ADB-BA9F-4F7C-980B-9B5DFD35393A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-12:*:*:*:*:*:*",
"matchCriteriaId": "B0C93397-269B-45A6-B4D1-75D70A60231E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-13:*:*:*:*:*:*",
"matchCriteriaId": "505A9FDE-FB70-46FA-9DF0-EB6464CBBA13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-15:*:*:*:*:*:*",
"matchCriteriaId": "DC388E6D-BC13-4CFF-AACE-774FBEF4C377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "0944ACF4-8180-4384-880D-303892924FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-5:*:*:*:*:*:*",
"matchCriteriaId": "4F58BC83-E4D2-412E-A422-6F3C2CAAA52F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:16.2.5:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "9C50878F-5A99-4347-8F98-BB226B2BB07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1409DBBE-EADF-4237-BD2D-32EE2D28C985",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.1:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "07DA2C14-D290-4D63-BBE7-46FBB1B164DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.1:patch1-5:*:*:*:*:*:*",
"matchCriteriaId": "F48C2113-CF55-4F3C-A8A4-E2422DAA26B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "C99159D6-85D9-45CC-B66D-77FD67FA01AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.2:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "A1EE7B57-F860-431F-883E-29EEADC87F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.3:-:*:*:*:*:*:*",
"matchCriteriaId": "C068A97F-2557-411F-A5A9-7B6037C0BF74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.3:patch1-4:*:*:*:*:*:*",
"matchCriteriaId": "78FDF23A-72EA-4950-90BD-52AA062ECBE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.3:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "C6B34A42-1A7B-4581-87E2-F7B23AA1F462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.4:-:*:*:*:*:*:*",
"matchCriteriaId": "2FE985DF-5384-439B-9C2A-227A970CCBD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.4:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "DBB31F5A-86B7-457B-85FA-544F89DB2B64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.4:patch1-6:*:*:*:*:*:*",
"matchCriteriaId": "137D5D7F-505F-4449-9954-B9826F69A4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.4:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "4F8DBB60-A56F-4FC9-AFDD-DBEDB6C482FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.5:-:*:*:*:*:*:*",
"matchCriteriaId": "D16DAB02-670E-4D89-9CAA-33A9684C9068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.5:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "4012D8CE-E93A-44A6-BB06-FE8FD95606F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.5:patch1-5:*:*:*:*:*:*",
"matchCriteriaId": "7FA21439-F4C6-4FD5-AFB9-FE15AE5BE068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.5:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "E38D64C7-7AE4-46EC-A327-38FB2A78F357",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:21.1.5:patch1-9:*:*:*:*:*:*",
"matchCriteriaId": "B123DCBF-C228-4A3C-ADC1-C9806B53CE58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA527BE-C0CD-4CA5-9713-58371D8F1F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0F71B7-A9CA-4B07-9550-64761ED94433",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.2.1:patch1-4:*:*:*:*:*:*",
"matchCriteriaId": "0426C921-182A-4F3F-BAAF-97F2E47C940D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3232567C-B89C-46EA-96DB-FAB08181BC86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.3.1:patch1-4:*:*:*:*:*:*",
"matchCriteriaId": "D2F98AFE-F0A5-49CB-8701-9574583038B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.3.1:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "12C92134-4FEF-46F6-9DAD-71DDE332EA55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.3.1:patch1-8:*:*:*:*:*:*",
"matchCriteriaId": "079B185C-C6BA-4B96-8A4B-FB921800DEBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.3.1:patch1cc-2:*:*:*:*:*:*",
"matchCriteriaId": "D2497289-6434-4ED1-97A3-F8001369D583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A18321A-679E-4890-ACEA-CBD9231E3E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.4.1:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "F90244BE-C87B-4D69-B247-BA711DCDE130",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.4.1:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "A4DDC313-20AA-437B-BABD-AFED6684E428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE46451-0692-4DFB-A256-33CC1790122B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.5.1:patch1-2:*:*:*:*:*:*",
"matchCriteriaId": "B27EE463-A425-4496-9669-5F8E2C0BF55F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.5.1:patch1-3:*:*:*:*:*:*",
"matchCriteriaId": "DCB07AB2-512D-4FC4-A08E-5AC6DB34FDFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.5.1:patch1-7:*:*:*:*:*:*",
"matchCriteriaId": "0E688D75-82CF-489B-9C61-FF5750FFC1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.5.1:patch1-9:*:*:*:*:*:*",
"matchCriteriaId": "5B75F283-B37E-4915-86AF-674E6248AFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AB6B6E07-60F4-4142-A23E-A825F4476C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:extremenetworks:extremexos:22.6.1:patch1-1:*:*:*:*:*:*",
"matchCriteriaId": "BE1C7D33-D00E-44D2-8D9D-30092C61FCD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Extreme EXOS 15.7, 16.x, 21.x, and 22.x allows remote attackers to trigger a buffer overflow leading to a reboot."
},
{
"lang": "es",
"value": "Extreme EXOS en versiones 15.7, 16.x, 21.x y 22.x permite que atacantes remotos desencadenen un desbordamiento de buffer que provocar\u00e1 un reinicio."
}
],
"id": "CVE-2017-14328",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-23T08:29:00.260",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://extremeportal.force.com/ExtrArticleDetail?n=000017765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://extremeportal.force.com/ExtrArticleDetail?n=000017765"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…