Hej du,
Indvies!

35,000 ransomware infektioner per måned og du stadig tror du er beskyttet?

Tilmeld dig:

  • advarsler
  • nyheder
  • gratis how-to-fjerne guider

af de nyeste online trusler - direkte til din indbakke:


Dell SonicWALL Email Security Platform Mangler kan forårsage følsomme oplysninger

sårbarhed-stforum

Four previously unknown vulnerabilities were found in the Dell SonicWALL Email Security virtual appliance app by researchers at Digital Defense Inc. Forskerne opdaget fejlene samtidig udvikle nye revisionsmoduler for sin patenterede sårbarhed scanning teknologi. The flaws should be addressed immediately because of the easily accessible web interface on internet or intranet-connected application for the app. Endvidere, there’s a potential for unauthorized individuals to access sensitive information.

The Dell SonicWALL Email Security platform can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and with spam protection, compliance scanning, anti-malware and anti-virus capabilities.

What’s the Impact of the Flaws in Dell SonicWALL Email Security platform?

If these vulnerabilities end up being exploited in the wild, worst case scenario is sensitive data disclosure of admin account password hash, arbitrary OS command execution and file deletion as ROOT. Til sidst, the scenario would end with complete compromise of the appliance.

Relaterede: Dell Tech Support snyd Peg på en Major Kundedata Misligholdelse

Heldigvis, Dell has already addressed the vulnerabilities in a rollup patch 8.3.2 for the SonicWALL Email Security platform. The patch has been available to customers since October 3, 2016.

Here is a short resume of all four vulnerabilities:

  • Authentication Bypass in DLoadReportsServlet
  • Impact: Sensitive information disclosure including config files and the SHA1 password hash for the admin account.

  • Authenticated XML External Entity Injection in known_network_data_import.html
  • Impact: videregivelse Information.

  • Authenticated Remote Command Execution in manage_ftpprofile.html
  • Impact: Arbitrary OS command execution as root, full compromise of the virtual appliance.

  • Authenticated Arbitrary File Deletion in policy_dictionary.html
  • Impact: Deletion of arbitrary files with root privileges, denial of service.

    Milena Dimitrova

    En inspireret forfatter, fokuseret på brugernes privatliv og skadeligt software. Nyder 'Hr. Robot "og frygt« 1984.

    Flere indlæg - Websted

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.