CERTA-2005-AVI-092

Vulnerability from certfr_avis - Published: 2005-02-28 - Updated: 2005-02-28

None

Description

La console HMC (Hardware Management Console) permet de gérer les partitions logiques d'un système.

Une vulérabilité découverte dans Hardware Management Console de IBM permet à un utilisateur local mal intentionné d'élever ses privilèges. La vulnérabilité est présente dans l'application Guided Setup Wizard qui permet à un individu d'exécuter certaines actions non autorisées.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. Section Documentation).

None
Impacted products
Vendor Product Description
IBM N/A IBM Hardware Management Console (HMC) pour pSeries 4.0.
IBM N/A IBM Hardware Management Console (HMC) pour iSeries 4.0 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Hardware Management Console (HMC) pour pSeries 4.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Hardware Management Console (HMC) pour iSeries 4.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLa console HMC (Hardware Management Console) permet de g\u00e9rer les\npartitions logiques d\u0027un syst\u00e8me.\n\nUne vul\u00e9rabilit\u00e9 d\u00e9couverte dans Hardware Management Console de IBM\npermet \u00e0 un utilisateur local mal intentionn\u00e9 d\u0027\u00e9lever ses privil\u00e8ges.\nLa vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans l\u0027application Guided Setup Wizard qui\npermet \u00e0 un individu d\u0027ex\u00e9cuter certaines actions non autoris\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. Section Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-02-28T00:00:00",
  "last_revision_date": "2005-02-28T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Secunia SA14377 du 24 f\u00e9vrier 2005 :",
      "url": "http://secunia.com/advisories/14377/"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 IBM pour Hardware Management    Console :",
      "url": "http://techsupport.services.ibm.com/server/hmc"
    }
  ],
  "reference": "CERTA-2005-AVI-092",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-02-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans IBM Hardware Management Console",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 S\u00e9cunia SA14377 du 24 f\u00e9vrier 2005",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…