cvelist/2004/2xxx/CVE-2004-2600.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:59:23 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2600",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:59:23 +00:00
"lang": "eng",
"value": "The firmware for Intelligent Platform Management Interface (IPMI) 1.5-based Intel Server Boards and Platforms is shipped with an Authentication Type Enables parameter set to an invalid None parameter, which allows remote attackers to obtain sensitive information when LAN management functionality is enabled."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:59:23 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.intel.com/support/motherboards/server/sb/CS-010422.htm",
"refsource": "MISC",
"url": "http://support.intel.com/support/motherboards/server/sb/CS-010422.htm"
},
{
"name": "4978",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4978"
},
{
"name": "intel-ssu-gain-access(15775)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15775"
},
{
"name": "10068",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10068"
},
{
"name": "ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf",
"refsource": "CONFIRM",
"url": "ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf"
},
{
"name": "11315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11315"
}
]
}
}