ID

VAR-202004-1907


CVE

CVE-2020-5347


TITLE

Dell EMC Isilon OneFS Resource exhaustion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-003672

DESCRIPTION

Dell EMC Isilon OneFS versions 8.2.2 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses. Dell EMC Isilon OneFS Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. Dell EMC Isilon OneFS is a scale-out storage system for unstructured data from Dell

Trust: 1.71

sources: NVD: CVE-2020-5347 // JVNDB: JVNDB-2020-003672 // VULHUB: VHN-183472

AFFECTED PRODUCTS

vendor:dellmodel:emc isilon onefsscope:lteversion:8.2.2

Trust: 1.0

vendor:dell emc old emcmodel:isilon onefsscope:eqversion:8.2.2

Trust: 0.8

sources: JVNDB: JVNDB-2020-003672 // NVD: CVE-2020-5347

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5347
value: HIGH

Trust: 1.0

security_alert@emc.com: CVE-2020-5347
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-003672
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202004-131
value: HIGH

Trust: 0.6

VULHUB: VHN-183472
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-5347
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003672
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-183472
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-5347
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

security_alert@emc.com: CVE-2020-5347
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-003672
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-183472 // JVNDB: JVNDB-2020-003672 // CNNVD: CNNVD-202004-131 // NVD: CVE-2020-5347 // NVD: CVE-2020-5347

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-183472 // JVNDB: JVNDB-2020-003672 // NVD: CVE-2020-5347

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-131

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202004-131

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003672

PATCH

title:DSA-2020-054url:https://www.dell.com/support/security/en-us/details/542190/DSA-2020-054-Dell-EMC-Isilon-OneFS-Security-Update-for-DNS-Protocol-Vulnerabilities

Trust: 0.8

title:Dell EMC Isilon OneFS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113243

Trust: 0.6

sources: JVNDB: JVNDB-2020-003672 // CNNVD: CNNVD-202004-131

EXTERNAL IDS

db:NVDid:CVE-2020-5347

Trust: 2.5

db:JVNDBid:JVNDB-2020-003672

Trust: 0.8

db:CNNVDid:CNNVD-202004-131

Trust: 0.7

db:CNVDid:CNVD-2020-23236

Trust: 0.1

db:VULHUBid:VHN-183472

Trust: 0.1

sources: VULHUB: VHN-183472 // JVNDB: JVNDB-2020-003672 // CNNVD: CNNVD-202004-131 // NVD: CVE-2020-5347

REFERENCES

url:https://www.dell.com/support/security/en-us/details/542190/dsa-2020-054-dell-emc-isilon-onefs-security-update-for-dns-protocol-vulnerabilities

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-5347

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5347

Trust: 0.8

sources: VULHUB: VHN-183472 // JVNDB: JVNDB-2020-003672 // CNNVD: CNNVD-202004-131 // NVD: CVE-2020-5347

SOURCES

db:VULHUBid:VHN-183472
db:JVNDBid:JVNDB-2020-003672
db:CNNVDid:CNNVD-202004-131
db:NVDid:CVE-2020-5347

LAST UPDATE DATE

2024-11-23T23:11:26.530000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-183472date:2020-04-06T00:00:00
db:JVNDBid:JVNDB-2020-003672date:2020-04-22T00:00:00
db:CNNVDid:CNNVD-202004-131date:2020-04-07T00:00:00
db:NVDid:CVE-2020-5347date:2024-11-21T05:33:57.460

SOURCES RELEASE DATE

db:VULHUBid:VHN-183472date:2020-04-04T00:00:00
db:JVNDBid:JVNDB-2020-003672date:2020-04-22T00:00:00
db:CNNVDid:CNNVD-202004-131date:2020-04-03T00:00:00
db:NVDid:CVE-2020-5347date:2020-04-04T00:15:23.793