![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.123752 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2013-0123) |
Zusammenfassung: | The remote host is missing an update for the 'OpenIPMI' package(s) announced via the ELSA-2013-0123 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'OpenIPMI' package(s) announced via the ELSA-2013-0123 advisory. Vulnerability Insight: [2.0.16-16.el5] - ipmitool: fix ipmi command retry shifts replies (#863310) [2.0.16-15.el5] - ipmitool: added -b, -B, -l and -T options to ipmitool man page (#846596) - ipmitool: fixed man page documentation for delloem setled command (#797050) [2.0.16-14.el5] - ipmitool: fixed wrong permissions on ipmievd.pid (#834190) [2.0.16-13.el5] - ipmitool: updated delloem commands (#797050) - ipmitool: fixed exit code of 'ipmitool -o list' command (#740780) - ipmitool: disabled automatic bridging of SDR readings to IPMB in verbose mode (#749796) - ipmitool: fixed reporting of usage of various delloem subcommands (#658762) - added path to /sbin to lsmod and modprobe (#829705) Affected Software/OS: 'OpenIPMI' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 3.6 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4339 47173 http://secunia.com/advisories/47173 47228 http://secunia.com/advisories/47228 47376 http://secunia.com/advisories/47376 51036 http://www.securityfocus.com/bid/51036 DSA-2376 http://www.debian.org/security/2011/dsa-2376 FEDORA-2011-17065 http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.html FEDORA-2011-17071 http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.html MDVSA-2011:196 http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 RHSA-2011:1814 http://www.redhat.com/support/errata/RHSA-2011-1814.html RHSA-2013:0123 http://rhn.redhat.com/errata/RHSA-2013-0123.html [oss-security] 20111213 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions http://openwall.com/lists/oss-security/2011/12/13/1 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf https://bugzilla.redhat.com/show_bug.cgi?id=742837 impitool-pid-dos(71763) https://exchange.xforce.ibmcloud.com/vulnerabilities/71763 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |