First published: Mon Oct 03 2011(Updated: )
ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ipmitool | =1.8.11 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4339 is categorized as a medium severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2011-4339, change the permissions of the ipmievd.pid file to restrict access, typically to 0644.
CVE-2011-4339 affects ipmitool version 1.8.11.
Yes, local users can exploit CVE-2011-4339 to kill arbitrary processes due to the insecure file permissions.
Yes, CVE-2011-4339 is present in Red Hat Enterprise Linux 6, specifically related to the ipmitool package.