Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.0993 ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities 20 April 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: EMC ViPR SRM Publisher: EMC Operating System: Windows Linux variants Impact/Access: Cross-site Request Forgery -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-0891 - --------------------------BEGIN INCLUDED TEXT-------------------- ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities CVE Identifier: CVE-2016-0891 EMC Identifier: ESA-2016-039 Severity Rating: CVSS Base Score 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) Affected products: EMC ViPR SRM versions prior to 3.7 Summary: EMC ViPR SRM contains fixes for Cross-Site Request Forgery vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. Details: EMC ViPR SRM is affected by multiple cross-site request forgery vulnerabilities in certain administrative pages of the application. Attackers may potentially exploit these vulnerabilities to execute unauthorized requests on behalf of authenticated administrative users of the application. Resolution The following EMC ViPR SRM release contains resolutions to these vulnerabilities: EMC ViPR SRM version 3.7 or later EMC recommends all customers upgrade at the earliest opportunity. Link To Remedies: Registered EMC Online Support customers can download patches and software from support.emc.com at: https://support.emc.com/downloads/34247_ViPR-SRM. Credits: EMC would like to thank Han Sahin of Securify B.V. (han.sahin@securify.nl) for reporting these vulnerabilities. EMC Product Security Response Center security_alert@emc.com - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVxbdoX6ZAP0PgtI9AQIoZRAA0QoeJgOiPJoAHbv0zxcRonJ4QtrpZM2v 5mkO3QHU3xtnqqRcfkPy2VgAwPX1ymn1xCTFlGHI9blpUgRaVbDuxkRdJbv8ioro tKjTuuMsIB9PRabZM5NRsWU1SljkP3Wfr4RiXbASwuhwAEBTx3BWulH+kULE6ct2 c/5WUcuUMPUNiNX6hWBy+TWouHnAxj0Dtf9DjRgbc2H5cttJHIL7mB7NKau+2yhv mWwnZ1taRRDltUfVQ7EfI1nF3O0PnbdPCbCSSBIXvSWZpA96QRDQMSJ+yl3tBUzb vMhKijG/gx6APvFCyvbrViw/XGKgLXeiXXrEPTqUy6b2cJLKyzqUyU8zZfooMBtm AkWGEuKyHYhAIpsRwqnwnTC24cXR6PlEb0jShbGsOfVAxSkN0qupmXb/4FAu3yKC lYbbwpPLVchkNOYFC9cKCbTlmj+kj12Uqen2mRV9sdzYNETgN8xr0lQftroyIQY9 eW6h/L1bqnDwXzIjHqrw/dzM3FuSZnrbovVXZn6rYFWz5nUJ5Ur48MUS56Rc7cHK yZVv6kqBkR++DJ0XJKOz7FOudyea5BtjaKf8s3S+mHpjFnjEr6+WaTcn+CEa0IO/ RLNdjna3Gkd1bMF+0yfcpiwNt/ZmYCxzYumXIvkDdGqT6F4SQJV8l3Be9qm7adPO xG3kQqOwSss= =M8Gu -----END PGP SIGNATURE-----