-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2013.0032
        Multiple high severity vulnerabilities have been discovered
                       in Dell SonicWALL Scrutinizer
                               1 March 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Dell SonicWALL Scrutinizer
Operating System:     Windows
                      Network Appliance
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
Member content until: Sunday, March 31 2013

OVERVIEW

        Multiple high severity vulnerabilities were discovered in Dell 
        SonicWALL Scrutinizer. [1]


IMPACT

        The vendor has provided the following details regarding these 
        vulnerabilities:
        
        "Multiple persistent input validation vulnerabilities were detected 
        in the Sonicwall OEM Scrutinizer v9.5.2 and earlier applications. 
        The bugs allow remote attackers to implement/inject malicious script 
        code on the application side (persistent). Successful exploitation 
        of the vulnerabilities can lead to persistent session hijacking 
        (manager/admin), persistent phishing, persistent external redirects to 
        malware or scam and persistent web context manipulation in the 
        affected vulnerable module(s). Exploitation requires low user 
        interaction & a low privileged appliance web application user account.
        
        A blind SQL Injection vulnerability was detected in the Sonicwall OEM 
        Scrutinizer v9.5.2 and earlierapplications. The bug allows remote 
        attackers to execute/inject own sql statement/commands to manipulate 
        the affected vulnerable application dbms. Exploitation requires no 
        user interaction & without privileged application user account. 
        Successful exploitation of the remote sql vulnerability results in 
        dbms & application compromise." [1]


MITIGATION

        The vendor recommends existing users of Dell SonicWALL Scrutinizer 
        10.1.0 and earlier versions to upgrade to version 10.1.2. [1]


REFERENCES

        [1] Dell SonicWALL Scrutinizer Service Bulletin for Multiple
            Vulnerabilities
            http://www.sonicwall.com/us/shared/download/Support_Bulletin_-_Scrutinizer_Vulnerabilities_130222.pdf

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUTA1Ce4yVqjM2NGpAQIrRg/+Iw1MKOfC1TntGHrZ9aNRnEQIsZ/VHpld
rLEXrv0xNJVgwSrloom28CEIf2VJ51lu3VyWkk0Ld8iyvFuONa6dxMNRhMQmmWS8
0gyHSfw0tWlzVwES7AokoNRcNs1pZdveAw4uR63hwfepyz7WMBYUqoBRTQP8vCRV
UUWawTwLy4YFYkoKuiDvTy28Mzxqe/B3wKGTMo++yGUN6Ws3yECYPdJgMYlS+BOJ
8sauIbzzTW49Tih1fb2LE+zVqIGUDlrV093RTEvG4K7dKWwchcGFhriFN5/A0dNt
nphQS936KgriJxQuq1htV4ouPsIIE4jVMWad+jli18C04HyHaD/krUeTGqwxCAlL
1XGf7HHD4kmjgYJ04JVqu7cldaXypgBcZsSlHhPRWt/RrZ7wBtoLMWn4tCLnycsy
Cwdz714Oc8VygelvK2OgaIQRc1vQZ4PyaC4WOv9YUnfK1ZomX56NqiUqQFTqQifs
brVkwhOaMdZMDROC9HFnQ987u1E2WaAkV5p/+YJrO7CSo7dwZiKAAolY+IBnorWY
KQKmFDsJJojjfDVW+QMg0fIbRNpzQAqJ3mbJumvBu9cKfhgvMD2252uJzFLPr6F3
2KszyyK0YzqRJW0trtsv2fqN2Cw2BVxizueJDMgGbDY7goYTrgRQev6iYlr25E/Z
OkPNp40NMMY=
=oGu5
-----END PGP SIGNATURE-----