2024-07-14 02:06:08 +00:00

144 lines
5.1 KiB
JSON

{
"id": "CVE-2007-0661",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-01T22:28:00.000",
"lastModified": "2011-03-08T02:50:29.547",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "The IPMI configuration does not appear to be the cause, but an extra condition for when it's possible. This is the reason for medium access complexity.",
"descriptions": [
{
"lang": "en",
"value": "Intel Enterprise Southbridge 2 Baseboard Management Controller (BMC), Intel Server Boards 5000XAL, S5000PAL, S5000PSL, S5000XVN, S5000VCL, S5000VSA, SC5400RA, and OEM Firmware for Intel Enterprise Southbridge Baseboard Management Controller before 20070119, when Intelligent Platform Management Interface (IPMI) is enabled, allow remote attackers to connect and issue arbitrary IPMI commands, possibly triggering a denial of service."
},
{
"lang": "es",
"value": "Intel Enterprise Southbridge 2 Baseboard Management Controller (BMC), Intel Server Boards 5000XAL, S5000PAL, S5000PSL, S5000XVN, S5000VCL, S5000VSA, SC5400RA, y OEM Firmware para Intel Enterprise Southbridge Baseboard Management Controller versiones anteriores a 20070119, cuando la interfaz Intelligent Platform Management Interface (IPMI) est\u00e1 habilitada, permite a atacantes remotos conectar y enviar comandos IPMI de su elecci\u00f3n, posiblemente provocando una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:enterprise_southbridge_2_bmc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A12549-3C2C-4877-AF2B-7770DC34CD41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:enterprise_southbridge_bmc:*:*:oem:*:*:*:*:*",
"matchCriteriaId": "9E881479-11FD-4D6A-B7BD-3C401AFCBECD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000pal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCC2CE5-078A-4725-9A80-15D305D921D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000psl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "270D2AD7-314B-4352-B248-F0F397415540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000vcl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1417AA-F5B1-4B51-AA92-E6CC19E35B8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000vsa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99B57CB7-20F4-4B87-A24A-F6A29F252603"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000xal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEF5806-D8FE-4A9F-9632-02171B813391"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_s5000xvn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "347B10B4-B4B0-4993-9843-FA1B9C877810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:server_board_sc5400ra:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DD15B7-918D-4BD5-82FB-EE6752C46EDE"
}
]
}
]
}
],
"references": [
{
"url": "http://lz1.intel.com/psirt/advisory.aspx?intelid=INTEL-SA-00012&languageid=en-fr",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/33044",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/23989",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/22341",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0432",
"source": "cve@mitre.org"
}
]
}