2017-10-16 12:31:07 -04:00
{
2019-03-18 06:12:30 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2011-4339" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 06:12:30 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
} ,
{
"name" : "MDVSA-2011:196" ,
"refsource" : "MANDRIVA" ,
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:196"
} ,
{
"name" : "47228" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/47228"
} ,
{
"name" : "47376" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/47376"
} ,
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=742837" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=742837"
} ,
{
"name" : "impitool-pid-dos(71763)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71763"
} ,
{
"name" : "51036" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/51036"
} ,
{
"name" : "DSA-2376" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2011/dsa-2376"
} ,
{
"name" : "RHSA-2011:1814" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1814.html"
} ,
{
"name" : "FEDORA-2011-17071" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html"
} ,
{
"name" : "[oss-security] 20111213 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions" ,
"refsource" : "MLIST" ,
"url" : "http://openwall.com/lists/oss-security/2011/12/13/1"
} ,
{
"name" : "47173" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/47173"
} ,
{
"name" : "FEDORA-2011-17065" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html"
} ,
{
"name" : "RHSA-2013:0123" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0123.html"
} ,
{
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
}
]
}
}