DSA-2023-192: Security Update for a Dell Update Package (DUP) Framework Vulnerability

Сводка: Dell Update Package (DUP) Framework remediation is available for a Windows junction / mount point vulnerability that could be exploited by malicious users to compromise the affected system. ...

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Влияние

Medium

Подробные сведения

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32454 DUP framework version 4.9.4.36 and prior contains insecure operation on Windows junction/Mount point vulnerability. A local malicious standard user could exploit the vulnerability to create arbitrary files, leading to denial of service 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-32454 DUP framework version 4.9.4.36 and prior contains insecure operation on Windows junction/Mount point vulnerability. A local malicious standard user could exploit the vulnerability to create arbitrary files, leading to denial of service 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
Dell рекомендует всем клиентам учитывать как базовую оценку CVSS, так и любые временные и обусловленные средой оценки, которые могут повлиять на потенциальную степень серьезности конкретной уязвимости.

Затронутые продукты и исправление

AFFECTED PRODUCT:

For Dell Client Platforms: Dell Update Packages (DUP) Framework file versions prior to 4.9.4.36.

REMEDIATION DETAILS:

A (DUP) is a self-contained executable in a standard package format that updates a single software/firmware element on the system.  A DUP consists of two parts:
  1. A framework providing a consistent interface for applying payloads.
  2. The payload that is the firmware/BIOS/Drivers/Applications
The following Dell Update Package (DUP) Frameworks contain a remediation to the vulnerability:
  • Dell Client Platforms:  Dell Update Package (DUP) Framework file version 4.9.7.21 or later
To check the DUP Framework file version, right-click on the DUP file, select Properties, and click on Details tab to find the File version number.

Customers should use the latest DUP available from Dell support when updating their systems. Customers do not need to download and rerun DUPs if the system is already running the latest BIOS, firmware, or driver content. 
  
CAUTION: Dell recommends executing DUP software packages from a protected location, one that requires administrative privileges to access as a best practice.
 
CAUTION: Dell recommends customers follow security best practices for malware protection. Customers should use security software to help protect against malware (advanced threat prevention software or anti-virus).

AFFECTED PRODUCT:

For Dell Client Platforms: Dell Update Packages (DUP) Framework file versions prior to 4.9.4.36.

REMEDIATION DETAILS:

A (DUP) is a self-contained executable in a standard package format that updates a single software/firmware element on the system.  A DUP consists of two parts:
  1. A framework providing a consistent interface for applying payloads.
  2. The payload that is the firmware/BIOS/Drivers/Applications
The following Dell Update Package (DUP) Frameworks contain a remediation to the vulnerability:
  • Dell Client Platforms:  Dell Update Package (DUP) Framework file version 4.9.7.21 or later
To check the DUP Framework file version, right-click on the DUP file, select Properties, and click on Details tab to find the File version number.

Customers should use the latest DUP available from Dell support when updating their systems. Customers do not need to download and rerun DUPs if the system is already running the latest BIOS, firmware, or driver content. 
  
CAUTION: Dell recommends executing DUP software packages from a protected location, one that requires administrative privileges to access as a best practice.
 
CAUTION: Dell recommends customers follow security best practices for malware protection. Customers should use security software to help protect against malware (advanced threat prevention software or anti-virus).

История изменений

RevisionDateDescription
1.02023-12-06Initial Release

Связанная информация

Затронутые продукты

Dell Update Packages - Current Version
Свойства статьи
Номер статьи: 000216236
Тип статьи: Dell Security Advisory
Последнее изменение: 06 Dec 2023
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.