|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for ipmitool RHSA-2011:1814-01|
|Summary:||The remote host is missing an update for the 'ipmitool'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'ipmitool'
package(s) announced via the referenced advisory.
The ipmitool package contains a command line utility for interfacing with
devices that support the Intelligent Platform Management Interface (IPMI)
specification. IPMI is an open standard for machine health, inventory, and
remote power control.
It was discovered that the IPMI event daemon (ipmievd) created its process
ID (PID) file with world-writable permissions. A local user could use this
flaw to make the ipmievd init script kill an arbitrary process when the
ipmievd daemon is stopped or restarted. (CVE-2011-4339)
All users of ipmitool are advised to upgrade to this updated package, which
contains a backported patch to correct this issue. After installing this
update, the IPMI event daemon (ipmievd) will be restarted automatically.
ipmitool on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-4339|
BugTraq ID: 51036
Debian Security Information: DSA-2376 (Google Search)
RedHat Security Advisories: RHSA-2013:0123
XForce ISS Database: impitool-pid-dos(71763)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.