ID

VAR-201505-0258


CVE

CVE-2015-3990


TITLE

plural Dell SonicWALL Product GMS ViewPoint Web An arbitrary command execution vulnerability in the application

Trust: 0.8

sources: JVNDB: JVNDB-2015-002771

DESCRIPTION

The GMS ViewPoint (GMSVP) web application in Dell Sonicwall GMS, Analyzer, and UMA EM5000 before 7.2 SP4 allows remote authenticated users to execute arbitrary commands via vectors related to configuration. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. Authentication is required to exploit this vulnerability.The specific flaw exists within the GMS ViewPoint (GMSVP) web application. The issue lies in the handling of configuration input due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges on the underlying operating system. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software. The following products and versions are affected: Dell Sonicwall GMS 7.2 SP3 and earlier, Analyzer 7.2 SP3 and earlier, UMA EM5000 7.2 SP3 and earlier

Trust: 2.61

sources: NVD: CVE-2015-3990 // JVNDB: JVNDB-2015-002771 // ZDI: ZDI-15-231 // BID: 74756 // VULHUB: VHN-81951

AFFECTED PRODUCTS

vendor:sonicwallmodel:global management systemscope:lteversion:7.2

Trust: 1.0

vendor:sonicwallmodel:analyzerscope:lteversion:7.2

Trust: 1.0

vendor:sonicwallmodel:uma em5000scope:lteversion:7.2

Trust: 1.0

vendor:dellmodel:sonicwall analyzerscope:ltversion:7.2 sp4

Trust: 0.8

vendor:dellmodel:sonicwall global management systemscope:ltversion:7.2 sp4

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope: - version: -

Trust: 0.8

vendor:dellmodel:sonicwall e-class universal management appliance em5000scope:ltversion:7.2 sp4

Trust: 0.8

vendor:sonicwallmodel:gms virtual appliancescope: - version: -

Trust: 0.7

vendor:sonicwallmodel:global management systemscope:eqversion:7.2

Trust: 0.6

vendor:sonicwallmodel:analyzerscope:eqversion:7.2

Trust: 0.6

vendor:sonicwallmodel:uma em5000scope:eqversion:7.2

Trust: 0.6

sources: ZDI: ZDI-15-231 // JVNDB: JVNDB-2015-002771 // CNNVD: CNNVD-201505-424 // NVD: CVE-2015-3990

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3990
value: HIGH

Trust: 1.0

NVD: CVE-2015-3990
value: HIGH

Trust: 0.8

ZDI: CVE-2015-3990
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201505-424
value: CRITICAL

Trust: 0.6

VULHUB: VHN-81951
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3990
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

VULHUB: VHN-81951
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-231 // VULHUB: VHN-81951 // JVNDB: JVNDB-2015-002771 // CNNVD: CNNVD-201505-424 // NVD: CVE-2015-3990

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-81951 // JVNDB: JVNDB-2015-002771 // NVD: CVE-2015-3990

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-424

TYPE

Unknown

Trust: 0.3

sources: BID: 74756

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002771

PATCH

title:GMS/Analyzer/UMA Remote Code Execution, XXE, and Host Header Injection Vulnerabilities Resolution - May 2015url:https://support.software.dell.com/product-notification/152178

Trust: 0.8

title:SonicWALL has issued an update to correct this vulnerability.url:https://support.software.dell.com/product-notification/152178?productName=SonicWALL%20GMS

Trust: 0.7

sources: ZDI: ZDI-15-231 // JVNDB: JVNDB-2015-002771

EXTERNAL IDS

db:NVDid:CVE-2015-3990

Trust: 3.5

db:ZDIid:ZDI-15-231

Trust: 3.2

db:BIDid:74756

Trust: 1.4

db:SECTRACKid:1032373

Trust: 1.1

db:JVNDBid:JVNDB-2015-002771

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2659

Trust: 0.7

db:CNNVDid:CNNVD-201505-424

Trust: 0.7

db:VULHUBid:VHN-81951

Trust: 0.1

sources: ZDI: ZDI-15-231 // VULHUB: VHN-81951 // BID: 74756 // JVNDB: JVNDB-2015-002771 // CNNVD: CNNVD-201505-424 // NVD: CVE-2015-3990

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-15-231/

Trust: 2.5

url:https://support.software.dell.com/product-notification/152178

Trust: 1.7

url:http://www.securityfocus.com/bid/74756

Trust: 1.1

url:http://www.securitytracker.com/id/1032373

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3990

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3990

Trust: 0.8

url:https://support.software.dell.com/product-notification/152178?productname=sonicwall%20gms

Trust: 0.7

sources: ZDI: ZDI-15-231 // VULHUB: VHN-81951 // JVNDB: JVNDB-2015-002771 // CNNVD: CNNVD-201505-424 // NVD: CVE-2015-3990

CREDITS

kernelsmith - HP Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-15-231

SOURCES

db:ZDIid:ZDI-15-231
db:VULHUBid:VHN-81951
db:BIDid:74756
db:JVNDBid:JVNDB-2015-002771
db:CNNVDid:CNNVD-201505-424
db:NVDid:CVE-2015-3990

LAST UPDATE DATE

2024-11-23T22:01:45.729000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-231date:2015-05-15T00:00:00
db:VULHUBid:VHN-81951date:2018-03-13T00:00:00
db:BIDid:74756date:2015-05-21T00:00:00
db:JVNDBid:JVNDB-2015-002771date:2015-05-22T00:00:00
db:CNNVDid:CNNVD-201505-424date:2015-05-21T00:00:00
db:NVDid:CVE-2015-3990date:2024-11-21T02:30:13.283

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-231date:2015-05-15T00:00:00
db:VULHUBid:VHN-81951date:2015-05-20T00:00:00
db:BIDid:74756date:2015-05-21T00:00:00
db:JVNDBid:JVNDB-2015-002771date:2015-05-22T00:00:00
db:CNNVDid:CNNVD-201505-424date:2015-05-21T00:00:00
db:NVDid:CVE-2015-3990date:2015-05-20T18:59:05.793