6 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface. • https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q https://github.com/openbmc/docs/blob/master/release/release-notes.md https://github.com/openbmc/openbmc https://github.com/openbmc/openbmc/issues/3811 https://openbmc.org https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 58EXPL: 0

Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-125: Out-of-bounds Read •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. This vulnerability was identified during mitigation for CVE-2022-2809. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. • https://github.com/openbmc/bmcweb • CWE-121: Stack-based Buffer Overflow CWE-229: Improper Handling of Values CWE-787: Out-of-bounds Write •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS. • https://github.com/openbmc/bmcweb • CWE-122: Heap-based Buffer Overflow CWE-229: Improper Handling of Values CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

In OpenBMC 2.9, crafted IPMI messages allow an attacker to bypass authentication and gain full control of the system. En OpenBMC versión 2.9, los mensajes IPMI diseñados permiten a un atacante omitir la autenticación y conseguir el control total del sistema • https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q https://github.com/openbmc/openbmc https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html • CWE-287: Improper Authentication •