The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/35770 | Exploit |
http://www.kb.cert.org/vuls/id/843044 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-9RDQHM | Third Party Advisory US Government Resource |
http://www.exploit-db.com/exploits/35770 | Exploit |
http://www.kb.cert.org/vuls/id/843044 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-9RDQHM | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.exploit-db.com/exploits/35770 - Exploit | |
References | () http://www.kb.cert.org/vuls/id/843044 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/BLUU-9RDQHM - Third Party Advisory, US Government Resource |
Information
Published : 2014-12-19 11:59
Updated : 2024-11-21 02:18
NVD link : CVE-2014-8272
Mitre link : CVE-2014-8272
CVE.ORG link : CVE-2014-8272
JSON object : View
Products Affected
dell
- idrac6_monolithic
- idrac6_modular
- idrac7
intel
- ipmi
CWE