<!--X-Body-Begin-->
<!--X-User-Header-->
<a href="/fulldisclosure/"><img src="/images/fulldisclosure-logo.png" class="l-logo right" alt="fulldisclosure logo" width="80"></a>
<h2 class="m-list"><a href="/fulldisclosure/">Full Disclosure</a>
mailing list archives</h2>
<!--X-User-Header-End-->
<!--X-TopPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="32"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#34">By Date</a>
<a href="33"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="32"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#34">By Thread</a>
<a href="35"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<form class="nst-search center" action="/search/fulldisclosure">
<input class="nst-search-q" name="q" type="search" placeholder="List Archive Search">
<button class="nst-search-button" title="Search">
<img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search">
</button>
</form>
</div>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<h1 class="m-title">DSA-2018-205: Dell EMC RecoverPoint Multiple Vulnerabilities</h1>
<hr>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
<em>From</em>: <secure () Dell com>
<em>Date</em>: Thu, 8 Nov 2018 22:21:50 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<hr>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<pre style="margin: 0em;">-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
DSA-2018-205: Dell EMC RecoverPoint Multiple Vulnerabilities
Dell EMC Identifier: DSA-2018-205
CVE Identifier: CVE-2018-15771, CVE-2018-15772
Severity: Low
Severity Rating: See below for CVSSv3 Scores
Affected products:
Dell EMC RecoverPoint versions prior to 5.1.2.1
Dell EMC RecoverPoint Virtual Machine (VM) versions prior to 5.2.0.2
Summary:
Dell EMC RecoverPoint contains fixes to multiple security vulnerabilities which could potentially be exploited by
malicious users to compromise the affected system.
Details:
Information Disclosure Vulnerability
CVE-2018-15771
Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an
information disclosure vulnerability. A malicious boxmgmt user may potentially be able to determine the existence of
any system file via Boxmgmt CLI.
CVSSv3 Base Score: 2.3 (AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)
Uncontrolled Resource Consumption Vulnerability
CVE-2018-15772
Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an
uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large
amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI.
CVSSv3 Base Score: 3.4 (AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L)
Resolution:
The following Dell EMC RecoverPoint releases contain resolutions to these vulnerabilities:
* Dell EMC RecoverPoint for Virtual Machines 5.2.0.2
* Dell EMC RecoverPoint 5.1.2.1
Dell EMC recommends all customers upgrade at the earliest opportunity.
Link to remedies:
Customers can download software from:
<a rel="nofollow" href="https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN">https://support.emc.com/search/?text=RecoverPoint&searchLang=en_US&facetResource=DOWN</a>
Credits:
Dell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities.
Severity Rating
For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307
(<a rel="nofollow" href="https://support.emc.com/kb/468307">https://support.emc.com/kb/468307</a>). Dell EMC recommends all customers take into account both the base score and any
relevant temporal and environmental scores which may impact the potential severity associated with particular security
vulnerability.
Legal Information
Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise
from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical
Support (<a rel="nofollow" href="https://support.emc.com/servicecenter/contactEMC/">https://support.emc.com/servicecenter/contactEMC/</a>). Dell EMC distributes Dell EMC Security Advisories, in
order to bring to the attention of users of the affected Dell EMC products, important security information. Dell EMC
recommends that all users determine the applicability of this information to their individual situations and take
appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC
disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a
particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages
whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if
Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion
or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
-----BEGIN PGP SIGNATURE-----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=s3w/
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
<a rel="nofollow" href="https://nmap.org/mailman/listinfo/fulldisclosure">https://nmap.org/mailman/listinfo/fulldisclosure</a>
Web Archives & RSS: <a rel="nofollow" href="http://seclists.org/fulldisclosure/">http://seclists.org/fulldisclosure/</a>
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="32"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#34">By Date</a>
<a href="33"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="32"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#34">By Thread</a>
<a href="35"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
</div>
<h3 class="m-thread">Current thread:</h3>
<ul class="thread">
<li><strong>DSA-2018-205: Dell EMC RecoverPoint Multiple Vulnerabilities</strong> <em>secure (Nov 09)</em>
</li></ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
<p>