ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html - Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/12/13/1 - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0123.html - Third Party Advisory | |
References | () http://secunia.com/advisories/47173 - Broken Link | |
References | () http://secunia.com/advisories/47228 - Broken Link | |
References | () http://secunia.com/advisories/47376 - Broken Link | |
References | () http://www.debian.org/security/2011/dsa-2376 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 - Broken Link | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-1814.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/51036 - Third Party Advisory, VDB Entry | |
References | () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=742837 - Issue Tracking, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 - Third Party Advisory, VDB Entry |
03 Feb 2022, 19:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:red_hat:enterprise_linux:6:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:ipmitool_project:ipmitool:1.8.11:*:*:*:*:*:*:* |
CWE | CWE-732 | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=742837 - Issue Tracking, Patch | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | (CONFIRM) http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/47173 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/47376 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/47228 - Broken Link | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0123.html - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/51036 - Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 - Third Party Advisory, VDB Entry | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-1814.html - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 - Broken Link | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2011/dsa-2376 - Third Party Advisory | |
References | (MLIST) http://openwall.com/lists/oss-security/2011/12/13/1 - Mailing List, Third Party Advisory |
Information
Published : 2011-12-15 03:57
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4339
Mitre link : CVE-2011-4339
CVE.ORG link : CVE-2011-4339
JSON object : View
Products Affected
redhat
- enterprise_linux
ipmitool_project
- ipmitool
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource