Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.1518 ESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station 19 June 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: EMC VNX1 and VNX2 Publisher: EMC Operating System: Windows Impact/Access: Root Compromise -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2017-4987 CVE-2017-4985 CVE-2017-4984 - --------------------------BEGIN INCLUDED TEXT-------------------- ESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station EMC Identifier: ESA-2017-041 CVE Identifier: CVE-2017-4984, CVE-2017-4985, CVE-2017-4987 Severity Rating: CVSS v3 Base Score: See below for individual CVEs. Affected products: EMC VNX2 versions prior to OE for File 8.1.9.211 EMC VNX1 versions prior to OE for File 7.1.80.8 Summary: VNX Control Station for VNX1 and VNX2 contains fixes for multiple security vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. Details: Remote code execution vulnerability (CVE-2017-4984) An unauthenticated remote attacker may be able to elevate their permissions to root through a command injection. This may potentially be exploited by an attacker to run arbitrary code with root-level privileges on the targeted VNX Control Station system. CVSS v3 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Local privilege escalation vulnerability (CVE-2017-4985) A local authenticated user may potentially escalate their privileges to root due to authorization checks not being performed on certain perl scripts. This may potentially be exploited by an attacker to run arbitrary commands as root on the targeted VNX Control Station system. CVSS v3 Base Score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Uncontrolled search path vulnerability (CVE-2017-4987) This vulnerability may be exploited by a local authenticated user to load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system. CVSS v3 Base Score: 7.0 (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) Resolution: The following releases contains resolutions to these vulnerabilities EMC VNX2 OE for File 8.1.9.211 EMC VNX1 OE for File 7.1.80.8 EMC recommends all customers upgrade at the earliest opportunity. Link to remedies: To upgrade your EMC VNX system contact EMC VNX Customer Support: https://support.emc.com Registered EMC Support customers can download EMC VNX software from the EMC Online Support web site at https://support.emc.com. [The following is standard text included in all security advisories. Please do not change or delete.] Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWUcV8Yx+lLeg9Ub1AQgaEw/9GqzMcS1B0tjwopeJ/PT5cGbvWm2Oqnjc fKfi49M1Q7K9xihU9mTfjBssKteY0IDYopGrT9knGyHNfe62j7SW3hx5bRk4Ouqe dhYWsJflRhQfoOdzRTesqAjKATTACXY3psxy6WuoIPOdD9nHXli8N17+XVqo/tYK JolbZU7hSUkOo6hA999mPFwk5L/E8Y95txXXVhkbHXCq/Lz6tm7LZcA1++l2rZvu OqQILUTO1DI4b6+4mi6rWD9z+qyVFr8uJC848QIb30JN1TIQNjFlU/TC13R5d6RG JKs8XqdCBjZ+0LMu+vZ5i0LezirAdkFoBAigG7Uu55J9bjdQ9J7i5WsTx0xhU1mC HYrG403RDP/VUZNwVb+9UBR1ZArrFvCnADzQCEuO0c6y7sNY4YFqXIiGVFaZRg69 Xn6eod0BI6UAb1NwsvbiqueMNQzRllGxemUJ3dhPGq8wbb2hr7R0vc5oOOGZTAcG NWcCcmv2VjU0oqII95ubQGzjZbCjC5QfgDOVMqS6BlLQTZuJWnTU7YQ2lkog5wRC +TIx5aLxah34R42n+/pRRBaMpG6HEEkOgrBoy+GWJtBEXsU8eC+1ir0tBGpRlpdL hzTUj2PnMbfYSsnnLzY6lhbIef+kNhI7NHHsoiVEOQ/05C2FV6Wd19RI9J8yo2Gd YgkQOJo2Umg= =a9P9 -----END PGP SIGNATURE-----