Dell EMC OpenManage Enterprise Services False Positive Security Vulnerabilities
Сводка: This article provides a list of security vulnerabilities that cannot be exploited on the Dell EMC OpenManage Enterprise Services 1.2.1 and earlier versions but which may be identified by security scanners. ...
Данная статья применяется к
Данная статья не применяется к
Эта статья не привязана к какому-либо конкретному продукту.
В этой статье указаны не все версии продуктов.
Тип статьи по безопасности
Security KB
Идентификатор CVE
The CVE IDs are listed in the table below.
Сводка по проблеме
This article provides a list of security vulnerabilities that cannot be exploited on Dell EMC Open Manage Enterprise Services 1.2.1 and earlier versions but which may be identified by security scanners.
Подробные сведения
See the 'Recommendation' section below for details on each CVE.
Рекомендации
The vulnerabilities listed in the table below are in order by the date on which Dell EMC OpenManage Enterprise Services Engineering determined that Dell EMC OpenManage Enterprise Services version 1.2.1 and earlier versions were not vulnerable.
| Third-party Component | CVE IDs | Summary of Vulnerability | Reason why Product is not Vulnerable | Date Determined False Positive |
| Log4j-2.16 | CVE-2021-45105 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This may allow an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was addressed in Log4j 2.17.0, 2.12.3, and 2.3.1. Details from https://logging.apache.org/log4j/2.x/security.html: Alternatively, this infinite recursion issue can be mitigated in configuration:
|
Dell EMC OpenManage Enterprise Services is not using context lookup in pattern layout logging configuration. | Dec. 17, 2021 |
| Log4j-2.16 | CVE-2021-44832 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file may construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. | Dell EMC OpenManage Enterprise Services (OMES) does not use JDBCAppender configurations. | Jan. 6, 2022 |
Дополнительная информация
Note: Dell EMC OpenManage Enterprise Services version 1.2.2 released on February 8, 2022 includes the update to Log4j 2.17.1. Dell EMC OpenManage Enterprise Services version 1.2.2 download link: https://www.dell.com/support/home/en-us/drivers/driversdetails?driverid=99M1R.
Правовая оговорка
Затронутые продукты
OpenManage Enterprise Services, Product Security InformationСвойства статьи
Номер статьи: 000195420
Тип статьи: Security KB
Последнее изменение: 14 Feb 2022
Версия: 2
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.