DSA-2019-039: Dell Wyse Device Agent Buffer Overflow Vulnerability

Shrnutí: Dell WES Wyse Device Agent versions prior to 14.1.2.9 and Dell Wyse ThinLinux HAgent versions prior to 5.4.55 00.10 contain a buffer overflow vulnerability. Dell recommends upgrading at the earliest opportunity and follow instructions in the release notes to enable security options that are relevant for their environment. ...

Tento článek se vztahuje na Tento článek se nevztahuje na Tento článek není vázán na žádný konkrétní produkt. V tomto článku nejsou uvedeny všechny verze produktu.

Vliv

High

Podrobnosti

Dell WES Wyse Device Agent versions prior to 14.1.2.9 and Dell Wyse ThinLinux HAgent versions prior to 5.4.55 00.10 contain a buffer overflow vulnerability. An unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code on the system with privileges of the FTP client by sending specially crafted input data to the affected system.  The FTP code that contained the vulnerability has been removed.

In addition to the mitigation for this vulnerability, Wyse device agents listed  and Dell ThinOS Wyse Device Agent version ThinOS 8.6 have been updated to provide additional features for customers to further secure their Wyse environment.  For details on additional security enhancements that were introduced, please refer to release notes for each agent.
CVSSv3 Base Score 8.2 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L)

Dell WES Wyse Device Agent versions prior to 14.1.2.9 and Dell Wyse ThinLinux HAgent versions prior to 5.4.55 00.10 contain a buffer overflow vulnerability. An unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code on the system with privileges of the FTP client by sending specially crafted input data to the affected system.  The FTP code that contained the vulnerability has been removed.

In addition to the mitigation for this vulnerability, Wyse device agents listed  and Dell ThinOS Wyse Device Agent version ThinOS 8.6 have been updated to provide additional features for customers to further secure their Wyse environment.  For details on additional security enhancements that were introduced, please refer to release notes for each agent.
CVSSv3 Base Score 8.2 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L)

Společnost Dell Technologies všem zákazníkům doporučuje vzít v úvahu základní hodnocení CVSS i všechna související hodnocení v daném čase a prostředí, která mohou mít vliv na potenciální závažnost dané konkrétní bezpečnostní hrozby.

Dotčené produkty a náprava

Affected Products:

  • Dell WES Wyse Device Agent versions prior to 14.1.2.9
  • Dell Wyse ThinLinux HAgent versions prior to 5.4.55 00.10
 

Remediation:

The below Dell Wyse device agents contain a resolution to this vulnerability. 

  • Dell WES Wyse Device Agent version 14.1.2.9
  • Dell Wyse ThinLinux HAgent version 5.4.55 00.10
SLN316391_en_US__1icon Note: Dell ThinOS Wyse Device Agent is not impacted by CVE-2019-3712 however includes additional features mentioned above starting from version 8.6.

Dell recommends upgrading at the earliest opportunity and follow instructions in the release notes to enable security options that are relevant for their environment.

Downloads for the applicable versions are available below:

Affected Products:

  • Dell WES Wyse Device Agent versions prior to 14.1.2.9
  • Dell Wyse ThinLinux HAgent versions prior to 5.4.55 00.10
 

Remediation:

The below Dell Wyse device agents contain a resolution to this vulnerability. 

  • Dell WES Wyse Device Agent version 14.1.2.9
  • Dell Wyse ThinLinux HAgent version 5.4.55 00.10
SLN316391_en_US__1icon Note: Dell ThinOS Wyse Device Agent is not impacted by CVE-2019-3712 however includes additional features mentioned above starting from version 8.6.

Dell recommends upgrading at the earliest opportunity and follow instructions in the release notes to enable security options that are relevant for their environment.

Downloads for the applicable versions are available below:

Přijetí

Dell would like to thank Jason Larsen of IOActive for reporting this vulnerability.

Dell recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

Související informace

Dotčené produkty

Wyse 3010 Thin Clients/T10/T50/T00X, Wyse 3020 Thin / Zero Client, Wyse 3030 Thin Client, Wyse 3030 LT Thin Client, Wyse 3040 Thin Client, Wyse 5010 Thin Clients / D10D/D10DP/D90D7, Wyse 5040 AIO Thin Client, Wyse 5060 Thin Client , Wyse 5070 Thin Client, Wyse 7010 Thin Client / Z90D7 ...
Vlastnosti článku
Číslo článku: 000178238
Typ článku: Dell Security Advisory
Poslední úprava: 18 srp 2025
Najděte odpovědi na své otázky od ostatních uživatelů společnosti Dell
Služby podpory
Zkontrolujte, zda se na vaše zařízení vztahují služby podpory.