DSA-2024-309:针对不正确输入验证漏洞的 Dell PowerEdge 服务器安全更新
Summary: Dell PowerEdge 服务器修复可用于不当输入验证漏洞,恶意用户可能会利用该漏洞破坏受影响的系统。
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Medium
Details
| 专有代码 CVE | 描述 | CVSS 基本分数 | CVSS 矢量字符串 |
|---|---|---|---|
| CVE-2024-38303 | Dell PowerEdge 平台(2.22.x 之前的第 14 代英特尔 BIOS 版本)包含不正确输入验证漏洞。具有本地访问权限的高权限攻击者可能会利用此漏洞,从而导致信息泄露。 | 5.3 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N |
| 专有代码 CVE | 描述 | CVSS 基本分数 | CVSS 矢量字符串 |
|---|---|---|---|
| CVE-2024-38303 | Dell PowerEdge 平台(2.22.x 之前的第 14 代英特尔 BIOS 版本)包含不正确输入验证漏洞。具有本地访问权限的高权限攻击者可能会利用此漏洞,从而导致信息泄露。 | 5.3 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N |
Affected Products & Remediation
- 上面的“受影响的产品和修正措施”表格可能不是所有受影响的受支持版本的完整列表,并且可能会随着更多信息可用而更新。
- 由于更新以解决功能问题,第 14 代 PowerEdge 平台的先前 BIOS 版本已替换为更新版本。戴尔建议所有客户更新到可用的 BIOS 版本。
Revision History
| 修订 | 日期 | 描述 |
|---|---|---|
| 1.0 | 2024-08-28 | 初版 |
| 2.0 | 2024-09-10 |
|
| 3.0 | 2024-10-11 |
|
| 4.0 | 2024-11-01 | 格式更改,无内容更新。 |
| 5.0 | 2024-11-12 | 格式更改,无内容更新。 |
Acknowledgements
Dell 在此感谢 codebreaker1337 报告此问题。
Related Information
Legal Disclaimer
Affected Products
DSS 8440, Dell EMC XC Core XCXR2, Dell EMC XC Core XC740xd2, Dell EMC XC Core XC640 System, Dell EMC XC Core 6420 System, Dell EMC XC Core XC740xd System, Dell EMC XC Core XC940 System, PowerEdge XR2, Poweredge C4140, PowerEdge C6420, PowerEdge FC640
, PowerEdge M640, PowerEdge M640 (for PE VRTX), PowerEdge MX740C, PowerEdge MX840C, PowerEdge R440, PowerEdge R540, PowerEdge R640, PowerEdge R740, PowerEdge R740XD, PowerEdge R740XD2, PowerEdge R840, PowerEdge R940, PowerEdge R940xa, PowerEdge T440, PowerEdge T640, PowerEdge XE2420, PowerEdge XE7420, PowerEdge XE7440, Dell EMC Storage NX3240, Dell EMC Storage NX3340
...
Article Properties
Article Number: 000228135
Article Type: Dell Security Advisory
Last Modified: 18 Nov 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.