Dell EMC Unity Vulnerabilities Fixed ! Patch it
A dozens of vulnerabilities affecting Dell EMC Unity has been identified. Successful exploitation of these 55 flaws could lead to severe damage, for few publicly exploits available.
Below is a brief description of some of the reported flaws, in addition to their tracking keys and scores
CVE-2020-36229: A type confusion error in ldap_X509dn2bv when parsing X.509 DN in ad_keystring would allow remote threat actors sending specially crafted requests to crash it in a denial of service (DoS) condition. CVSS score of 6.5/10.
CVE-2020-17438: A boundary error while processing IP packets would allow malicious remote hackers to send specially crafted IP packets to the affected system, trigger an out-of-bounds write and thus executing arbitrary code. CVSS score of 8.5/10.
CVE-2020-13987: A boundary condition in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c would allow remote attackers sending specially crafted traffic to the system and trigger a DoS condition. CVSS score of 6.5/10.
CVE-2020-13988: An integer overflow in the affected implementation would allow a remote threat actor to send a specially crafted IP packet and trigger a DoS condition. CVSS score of 5.7/10.
CVE-2020-36221: An integer underflow within the serialNumberAndIssuerCheck() function in schema_init.c allows remote attackers to send specially crafted requests to the affected application, thus performing a DoS attack. CVSS score of 6.5/10.
CVE-2020-36222: A reachable assertion in slapd in the saslAuthzTo validation allows remote hackers to send specially designed requests aiming to perform a DoS attack. CVSS score of 6.5/10.
CVE-2020-36223: A boundary error during the Values Return Filter control handling would allow remote hackers to send a specially crafted request to the slapd, performing a DoS condition. CVSS score of 6.5/10.
CVE-2020-36224: The release of an invalid pointer when processing saslAuthzTo requests enables threat actors to send specially crafted requests and trigger DoS conditions. CVSS score of 6.5/10.
CVE-2020-36225: A boundary error in the saslAuthzTo processing would allow remote attackers sending specially crafted requests to the slapd, triggering a DoS attack. CVSS score of 6.5/10.
CVE-2020-36226: The improper management of internal resources within the application leading to a memch->bv_len miscalculation during saslAuthzTo processing would allow remote attackers sending specially crafted requests to the slapd and perform a DoS attack.
- Dell EMC Unity XT Operating Environment (OE): before 18.104.22.168.5.007
- Dell EMC UnityVSA Operating Environment (OE): before 22.214.171.124.5.007
- Dell EMC Unity Operating Environment (OE): before 126.96.36.199.5.007
A full list of detected vulnerabilities is available at Dell official support platforms.
Most of these flaws could be remotely exploited by non-authenticated threat actors and there are at least three publicly available exploits, so users of affected implementations should install the official security patches as soon as possible.