{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T15:13:24.341","vulnerabilities":[{"cve":{"id":"CVE-2017-14385","sourceIdentifier":"security_alert@emc.com","published":"2017-12-20T23:29:00.250","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 5.7.5.6; EMC Data Domain DD OS 6.0 family, versions prior to 6.0.2.9; EMC Data Domain DD OS 6.1 family, versions prior to 6.1.0.21; EMC Data Domain Virtual Edition 2.0 family, all versions; EMC Data Domain Virtual Edition 3.0 family, versions prior to 3.0 SP2 Update 1; and EMC Data Domain Virtual Edition 3.1 family, versions prior to 3.1 Update 2. EMC Data Domain DD OS contains a memory overflow vulnerability in SMBv1 which may potentially be exploited by an unauthenticated remote attacker. An attacker may completely shut down both the SMB service and active directory authentication. This may also allow remote code injection and execution."},{"lang":"es","value":"Se ha descubierto un problema en la familia de productos EMC Data Domain DD OS 5.7, en versiones anteriores a la 5.7.5.6; la familia de productos EMC Data Domain DD OS 6.0, en versiones anteriores a la 6.0.2.9; la familia de productos EMC Data Domain DD OS 6.1, en versiones anteriores a la 6.1.0.21; la familia de productos EMC Data Domain Virtual Edition 2.0 en todas sus versiones; la familia de productos EMC Data Domain Virtual Edition 3.0, en versiones anteriores a la 3.0 SP2 Update 1 y la familia de productos EMC Data Domain Virtual Edition 3.1, en versiones anteriores a la 3.1 Update 2. EMC Data Domain DD OS contiene una vulnerabilidad de desbordamiento de memoria en SMBv1, que podría ser explotada por un atacante remoto no autenticado. Un atacante podría cerrar por completo tanto la autenticación del directorio activo como del servicio SMB. Esto también podría permitir la inyección y ejecución remotas de código."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain:2.0:*:*:*:virtual:*:*:*","matchCriteriaId":"FE5EFDEC-E166-42F7-938D-7CBC49B5D361"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain:3.0:*:*:*:virtual:*:*:*","matchCriteriaId":"F7A08866-1116-44F9-BF45-61E70A87E81E"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain:3.0:sp2:*:*:virtual:*:*:*","matchCriteriaId":"AAE9E614-362E-438F-A152-E68E658D499B"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain:3.1:update_2:*:*:virtual:*:*:*","matchCriteriaId":"2AA14F6E-2C1E-41AF-A45A-150F43D33F80"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.7.5.6","matchCriteriaId":"FDDB5769-1D52-4AAC-8868-39B87BEDE34D"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.0.2.9","matchCriteriaId":"3321CCE6-9D7F-47CC-AD21-C7D97C39F1EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:emc:data_domain_os:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.1.0.21","matchCriteriaId":"F96D132F-05B7-4126-83A6-42A63AE3FA34"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2017/Dec/79","source":"security_alert@emc.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/102289","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040027","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2017/Dec/79","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/102289","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040027","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}