CVE-2011-4339

ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html Third Party Advisory
http://openwall.com/lists/oss-security/2011/12/13/1 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0123.html Third Party Advisory
http://secunia.com/advisories/47173 Broken Link
http://secunia.com/advisories/47228 Broken Link
http://secunia.com/advisories/47376 Broken Link
http://www.debian.org/security/2011/dsa-2376 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 Broken Link
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1814.html Third Party Advisory
http://www.securityfocus.com/bid/51036 Third Party Advisory VDB Entry
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=742837 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html Third Party Advisory
http://openwall.com/lists/oss-security/2011/12/13/1 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0123.html Third Party Advisory
http://secunia.com/advisories/47173 Broken Link
http://secunia.com/advisories/47228 Broken Link
http://secunia.com/advisories/47376 Broken Link
http://www.debian.org/security/2011/dsa-2376 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 Broken Link
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1814.html Third Party Advisory
http://www.securityfocus.com/bid/51036 Third Party Advisory VDB Entry
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=742837 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ipmitool_project:ipmitool:1.8.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html - Third Party Advisory
References () http://openwall.com/lists/oss-security/2011/12/13/1 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2011/12/13/1 - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0123.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0123.html - Third Party Advisory
References () http://secunia.com/advisories/47173 - Broken Link () http://secunia.com/advisories/47173 - Broken Link
References () http://secunia.com/advisories/47228 - Broken Link () http://secunia.com/advisories/47228 - Broken Link
References () http://secunia.com/advisories/47376 - Broken Link () http://secunia.com/advisories/47376 - Broken Link
References () http://www.debian.org/security/2011/dsa-2376 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2376 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 - Broken Link
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1814.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-1814.html - Third Party Advisory
References () http://www.securityfocus.com/bid/51036 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/51036 - Third Party Advisory, VDB Entry
References () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - Third Party Advisory () http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=742837 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=742837 - Issue Tracking, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 - Third Party Advisory, VDB Entry

Information

Published : 2011-12-15 03:57

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4339

Mitre link : CVE-2011-4339

CVE.ORG link : CVE-2011-4339


JSON object : View

Products Affected

redhat

  • enterprise_linux

ipmitool_project

  • ipmitool
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource