Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4786

Опубликовано: 08 июл. 2013
Источник: redhat
CVSS2: 5
EPSS Высокий

Описание

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

Отчет

This issue did not affect the versions of OpenIPMI or freeipmi as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5freeipmiNot affected
Red Hat Enterprise Linux 5OpenIPMINot affected
Red Hat Enterprise Linux 6freeipmiNot affected
Red Hat Enterprise Linux 6OpenIPMINot affected
Red Hat Enterprise Linux 7freeipmiNot affected
Red Hat Enterprise Linux 7OpenIPMINot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1326638freeipmi: Leakage of password hashes via RAKP authentication

EPSS

Процентиль: 99%
0.73191
Высокий

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 12 лет назад

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

CVSS3: 7.5
nvd
больше 12 лет назад

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

CVSS3: 7.5
debian
больше 12 лет назад

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange P ...

CVSS3: 7.5
github
больше 3 лет назад

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

EPSS

Процентиль: 99%
0.73191
Высокий

5 Medium

CVSS2