DSA-2019-162: Dell Command Update (DCU) Multiple Arbitrary File Deletion Vulnerabilities

DSA-2019-162: Dell Command Update (DCU) Multiple Arbitrary File Deletion Vulnerabilities


DSA Identifier: DSA-2019-162

CVE Identifiers: CVE-2019-3749, CVE-2019-3750

Severity: Medium

Severity Rating: CVSS Base Score: See individual CVSS V3 base scores below.

Affected products:

Dell Command Update (DCU) versions prior to 3.1

Summary:

Dell Command Update platforms require an update to address multiple arbitrary file deletion vulnerabilities.

Details:

  • Arbitrary File Deletion Vulnerability (CVE-2019-3749)

Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability. A local authenticated malicious user with low privileges potentially could exploit this vulnerability to delete arbitrary files by creating a symlink from the "Temp\ICProgress\Dell_InventoryCollector_Progress.xml" to any targeted file. This issue occurs because permissions on the Temp directory were set incorrectly.

CVSS V3 Base Score: 5.6 (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H)

  • Arbitrary File Deletion Vulnerability (CVE-2019-3750)

Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability. A local authenticated malicious user with low privileges potentially could exploit this vulnerability to delete arbitrary files by creating a symlink from the "Temp\IC\ICDebugLog.txt" to any targeted file. This issue occurs because of insecure handling of Temp directory permissions that were set incorrectly.

CVSS V3 Base Score: 5.6 (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H)

Resolution:

The following Dell Command Update release contains resolutions to these vulnerabilities:

  • Dell Command Update 3.1

Dell recommends all customers upgrade at the earliest opportunity.

Please visit the Dell Support Drivers and Downloads site for updates on the applicable products.

Credit:

Dell would like to thank Eran Shimony for reporting these vulnerabilities

Severity Rating:

For an explanation of Severity Ratings, refer to Dell Vulnerability Response Policy. Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.

Legal Information:

Dell recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell or its suppliers be liable for any damages whatsoever, including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.





Article ID: SLN319697

Last Date Modified: 12/03/2019 10:59 AM


Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.