Multiple stack-based buffer overflows in cgi/close_window.cgi in the web interface in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allow remote attackers to execute arbitrary code via the (1) sess_sid or (2) ACT parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.exploit-db.com/exploits/29666 - Exploit | |
References | () http://www.securityfocus.com/bid/63775 - | |
References | () http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf - Vendor Advisory | |
References | () http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013 - | |
References | () https://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities - Exploit | |
References | () https://support.citrix.com/article/CTX216642 - |
Information
Published : 2013-12-10 16:11
Updated : 2024-11-21 01:54
NVD link : CVE-2013-3623
Mitre link : CVE-2013-3623
CVE.ORG link : CVE-2013-3623
JSON object : View
Products Affected
supermicro
- intelligent_platform_management_firmware
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer