Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-4339

Overview

Vulnerability Score 3.6 3.6
CVE Id CVE-2011-4339
Last Modified 29 May 2013 11:10:43
Published 14 Dec 2011 10:57:34
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2011-4339

Summary

ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.

Vulnerable Systems

Application

  • Corey Minyard Openipmi 1.8.11


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=742837

MLIST - [oss-security] 20111213 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions

MANDRIVA - MDVSA-2011:196

XF - impitool-pid-dos(71763)

REDHAT - RHSA-2011:1814

SECUNIA - 47228

SECUNIA - 47173

DEBIAN - DSA-2376

SECUNIA - 47376

FEDORA - FEDORA-2011-17065

FEDORA - FEDORA-2011-17071

REDHAT - RHSA-2013:0123

CONFIRM - http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf

Related Patches

Red Hat 2013:0123-01 RHSA Low: OpenIPMI security, bug fix, and enhancement update for RHEL 5 x86


Last Updated: 27 May 2016 11:00:42