Vulnerability CVE-2004-2600


Published: 2004-12-31   Modified: 2012-02-12

Description:
The firmware for Intelligent Platform Management Interface (IPMI) 1.5-based Intel Server Boards and Platforms is shipped with an Authentication Type Enables parameter set to an invalid None parameter, which allows remote attackers to obtain sensitive information when LAN management functionality is enabled.

Vendor: HP
Product: Carrier grade server cc3310 
Version: a9863a; a9862a;
Product: Carrier grade server cc3300 
Version: a6901a; a6900a;
Product: Carrier grade server cc2300 
Version: a6899a; a6898a;
Vendor: Intel
Product: Cli auto-configuration utility 
Product: Server platform sr870bh2 
Product: Server board sds2 
Product: Carrier grade server tsrlt2 
Product: Server configuration wizard 
Product: Server platform srsh4 
Product: Server board se7501hg2 
Product: Entry server board se7210tp1-e 
Product: System setup utility 
Product: Server platform spsh4 
Product: Server board scb2 
Product: Carrier grade server tigpr2u 
Product: Client system setup utility 
Product: Server platform sr870bn4 
Product: Server board se7500wv2 
Product: Carrier grade server tsrmt2 
Product: Server control 
Product: Server board shg2 
Product: Entry server platform sr1325tp1-e 

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://secunia.com/advisories/11315
http://xforce.iss.net/xforce/xfdb/15775
http://www.securityfocus.com/bid/10068
http://www.osvdb.org/4978
http://support.intel.com/support/motherboards/server/sb/CS-010422.htm
ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf

Related CVE
CVE-2019-11129
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11128
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11127
Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11126
Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11125
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11124
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11123
Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11119
Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Copyright 2019, cxsecurity.com

 

Back to Top