Hé toi,
ÊTRE EN SAVOIR!

35,000 infections ransomware par mois et vous croyez toujours que vous êtes protégé?

Inscrivez-vous pour recevoir:

  • alertes
  • nouvelles
  • gratuit comment-remove-guides

des menaces les plus récentes en ligne - directement à votre boîte de réception:


Dell SonicWALL Flaws Plate-forme de sécurité de messagerie pourraient provoquer des informations sensibles Divulgation

vulnérabilité-stforum

Four previously unknown vulnerabilities were found in the Dell SonicWALL Email Security virtual appliance app by researchers at Digital Defense Inc. The researchers detected the flaws while developing new audit modules for its patented vulnerability scanning technology. The flaws should be addressed immediately because of the easily accessible web interface on internet or intranet-connected application for the app. En outre, there’s a potential for unauthorized individuals to access sensitive information.

The Dell SonicWALL Email Security platform can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and with spam protection, compliance scanning, anti-malware and anti-virus capabilities.

What’s the Impact of the Flaws in Dell SonicWALL Email Security platform?

If these vulnerabilities end up being exploited in the wild, worst case scenario is sensitive data disclosure of admin account password hash, arbitrary OS command execution and file deletion as ROOT. Finalement, the scenario would end with complete compromise of the appliance.

en relation: Dell Tech Support Escroqueries point à une violation majeure des données clients

Heureusement, Dell has already addressed the vulnerabilities in a rollup patch 8.3.2 for the SonicWALL Email Security platform. The patch has been available to customers since October 3, 2016.

Here is a short resume of all four vulnerabilities:

  • Authentication Bypass in DLoadReportsServlet
  • Impact: Sensitive information disclosure including config files and the SHA1 password hash for the admin account.

  • Authenticated XML External Entity Injection in known_network_data_import.html
  • Impact: Information disclosure.

  • Authenticated Remote Command Execution in manage_ftpprofile.html
  • Impact: Arbitrary OS command execution as root, full compromise of the virtual appliance.

  • Authenticated Arbitrary File Deletion in policy_dictionary.html
  • Impact: Deletion of arbitrary files with root privileges, déni de service.

    Milena Dimitrova

    Un écrivain inspiré, axé sur la vie privée de l'utilisateur et les logiciels malveillants. Aime 'M.. 1984 «robot» et les craintes de.

    Plus de messages - Site Internet

Partager sur Facebook Partager
Loading ...
Partager sur Twitter Tweet
Loading ...
Partager sur Google Plus Partager
Loading ...
Partager sur Linkedin Partager
Loading ...
Partager sur Digg Partager
Partager sur Reddit Partager
Loading ...
Partager sur Stumbleupon Partager
Loading ...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.