7 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface. • https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q https://github.com/openbmc/docs/blob/master/release/release-notes.md https://github.com/openbmc/openbmc https://github.com/openbmc/openbmc/issues/3811 https://openbmc.org https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 0%CPEs: 59EXPL: 0

Improper input validation in firmware for OpenBMC in some Intel(R) platforms before versions egs-0.91-179 and bhs-04-45 may allow an authenticated user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 58EXPL: 0

Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-125: Out-of-bounds Read •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. This vulnerability was identified during mitigation for CVE-2022-2809. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. • https://github.com/openbmc/bmcweb • CWE-121: Stack-based Buffer Overflow CWE-229: Improper Handling of Values CWE-787: Out-of-bounds Write •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS. • https://github.com/openbmc/bmcweb • CWE-122: Heap-based Buffer Overflow CWE-229: Improper Handling of Values CWE-787: Out-of-bounds Write •