{"vuid":"VU#214283","idnumber":"214283","name":"Commvault Edge contains a buffer overflow vulnerability","keywords":["buffer overflow","CWE-121"],"overview":"Commvault Edge, version 11 SP6 (11.80.50.0), is vulnerable to a stack-based buffer overflow vulnerability.","clean_desc":"CWE-121: Stack-based Buffer Overflow - CVE-2017-3195\nA stack based buffer overflow in the Commvault Edge Communication Service (cvd) allows remote attackers to execute arbitrary code via crafted packets, exploiting weaknesses in the key exchange mechanism. Access to TCP port 8400 (by default) on the target machine is necessary to exploit this vulnerability.","impact":"An unauthenticated remote attacker can execute arbitrary code with root/SYSTEM privileges.","resolution":"Apply an update\nCommvault has provided fixes in the latest service pack (SP7 and above) to address the vulnerability. SP6 customers can use hotfix 590.","workarounds":"","sysaffected":"","thanks":"Thanks to Claudio Moletta for reporting this vulnerability.","author":"This document was written by Trent Novelly.","public":["http://kb.commvault.com/article/SEC0013","https://cwe.mitre.org/data/definitions/121.html"],"cveids":["CVE-2017-3195"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2017-01-23T16:14:03Z","publicdate":"2017-03-15T00:00:00Z","datefirstpublished":"2017-03-16T13:20:21Z","dateupdated":"2017-03-16T13:26:34Z","revision":10,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"7.8","cvss_environmentalscore":"1.95642234144","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}