CVE-2011-4339

OpenIPMI - Local Privilege Escalation

Title source: llm
STIX 2.1

Description

ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.

References (15)

Core 15
Core References
Broken Link vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2011:196
Broken Link third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47228
Broken Link third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47376
Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=742837
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/71763
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/51036
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2011/dsa-2376
Third Party Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-1814.html
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2011/12/13/1
Broken Link third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47173
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html
Third Party Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2013-0123.html

Scores

EPSS 0.0006
EPSS Percentile 18.8%

Details

CWE
CWE-732
Status published
Products (1)
ipmitool_project/ipmitool 1.8.11
Published Dec 15, 2011
Tracked Since Feb 18, 2026