CVE-2018-11066

Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server.
References
Link Resource
http://www.securityfocus.com/bid/105968 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042153 Third Party Advisory VDB Entry
https://seclists.org/fulldisclosure/2018/Nov/49 Mailing List Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0029.html Patch Third Party Advisory
http://www.securityfocus.com/bid/105968 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042153 Third Party Advisory VDB Entry
https://seclists.org/fulldisclosure/2018/Nov/49 Mailing List Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0029.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dell:emc_avamar:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_avamar:18.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:emc_integrated_data_protection_appliance:2.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:vmware:vsphere_data_protection:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vsphere_data_protection:6.1.9:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105968 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/105968 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042153 - VDB Entry, Third Party Advisory () http://www.securitytracker.com/id/1042153 - Third Party Advisory, VDB Entry
References () https://seclists.org/fulldisclosure/2018/Nov/49 - Mailing List, Third Party Advisory () https://seclists.org/fulldisclosure/2018/Nov/49 - Mailing List, Third Party Advisory
References () https://www.vmware.com/security/advisories/VMSA-2018-0029.html - Patch, Third Party Advisory () https://www.vmware.com/security/advisories/VMSA-2018-0029.html - Patch, Third Party Advisory

Information

Published : 2018-11-26 20:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11066

Mitre link : CVE-2018-11066

CVE.ORG link : CVE-2018-11066


JSON object : View

Products Affected

dell

  • emc_integrated_data_protection_appliance
  • emc_avamar

vmware

  • vsphere_data_protection