ID

VAR-200412-0782


CVE

CVE-2004-2600


TITLE

Intel LAN Management Server Configuration Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200412-549

DESCRIPTION

The firmware for Intelligent Platform Management Interface (IPMI) 1.5-based Intel Server Boards and Platforms is shipped with an Authentication Type Enables parameter set to an invalid None parameter, which allows remote attackers to obtain sensitive information when LAN management functionality is enabled. It has been reported that the LAN management server setup utilities are prone to a remote configuration vulnerability. This issue is due to a design error that leaves the system insecure after remote management occurs. This issue may allow an attacker to gain unauthorized access to certain utilities on the affected system

Trust: 1.26

sources: NVD: CVE-2004-2600 // BID: 10068 // VULHUB: VHN-11028

AFFECTED PRODUCTS

vendor:intelmodel:cli auto-configuration utilityscope:eqversion:*

Trust: 1.0

vendor:intelmodel:server board scb2scope:eqversion:*

Trust: 1.0

vendor:intelmodel:server platform spsh4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:server platform srsh4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:server platform sr870bh2scope:eqversion:*

Trust: 1.0

vendor:intelmodel:entry server platform sr1325tp1-escope:eqversion:*

Trust: 1.0

vendor:intelmodel:carrier grade server tigpr2uscope:eqversion:*

Trust: 1.0

vendor:intelmodel:system setup utilityscope:eqversion:*

Trust: 1.0

vendor:intelmodel:server board sds2scope:eqversion:*

Trust: 1.0

vendor:intelmodel:entry server board se7210tp1-escope:eqversion:*

Trust: 1.0

vendor:intelmodel:carrier grade server tsrmt2scope:eqversion:*

Trust: 1.0

vendor:intelmodel:server configuration wizardscope:eqversion:*

Trust: 1.0

vendor:hpmodel:carrier grade server cc3310scope:eqversion:a9863a

Trust: 1.0

vendor:hpmodel:carrier grade server cc2300scope:eqversion:a6898a

Trust: 1.0

vendor:intelmodel:server platform sr870bn4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:server controlscope:eqversion:*

Trust: 1.0

vendor:intelmodel:server board shg2scope:eqversion:*

Trust: 1.0

vendor:intelmodel:carrier grade server tsrlt2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:carrier grade server cc3310scope:eqversion:a9862a

Trust: 1.0

vendor:hpmodel:carrier grade server cc3300scope:eqversion:a6900a

Trust: 1.0

vendor:intelmodel:server board se7501hg2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:carrier grade server cc3300scope:eqversion:a6901a

Trust: 1.0

vendor:intelmodel:server board se7500wv2scope:eqversion:*

Trust: 1.0

vendor:hpmodel:carrier grade server cc2300scope:eqversion:a6899a

Trust: 1.0

vendor:intelmodel:client system setup utilityscope:eqversion:*

Trust: 1.0

vendor:intelmodel:server platform srsh4scope: - version: -

Trust: 0.9

vendor:intelmodel:server platform sr870bn4scope: - version: -

Trust: 0.9

vendor:intelmodel:server platform sr870bh2scope: - version: -

Trust: 0.9

vendor:intelmodel:server platform spsh4scope: - version: -

Trust: 0.9

vendor:intelmodel:server board shg2scope: - version: -

Trust: 0.9

vendor:intelmodel:server board se7501hg2scope: - version: -

Trust: 0.9

vendor:intelmodel:server board se7500wv2scope: - version: -

Trust: 0.9

vendor:intelmodel:server board sds2scope: - version: -

Trust: 0.9

vendor:intelmodel:server board scb2scope: - version: -

Trust: 0.9

vendor:intelmodel:entry server platform sr1325tp1-escope: - version: -

Trust: 0.9

vendor:intelmodel:system setup utilityscope: - version: -

Trust: 0.3

vendor:intelmodel:server controlscope: - version: -

Trust: 0.3

vendor:intelmodel:server configuration wizardscope: - version: -

Trust: 0.3

vendor:intelmodel:entry server board se7210tp1-escope: - version: -

Trust: 0.3

vendor:intelmodel:client system setup utilityscope: - version: -

Trust: 0.3

vendor:intelmodel:cli auto-configuration utilityscope: - version: -

Trust: 0.3

vendor:intelmodel:carrier grade server tsrmt2scope: - version: -

Trust: 0.3

vendor:intelmodel:carrier grade server tsrlt2scope: - version: -

Trust: 0.3

vendor:intelmodel:carrier grade server tigpr2uscope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc3310 a9863ascope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc3310 a9862ascope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc3300 a6901ascope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc3300 a6900ascope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc2300 a6899ascope: - version: -

Trust: 0.3

vendor:hpmodel:carrier grade server cc2300 a6898ascope: - version: -

Trust: 0.3

sources: BID: 10068 // CNNVD: CNNVD-200412-549 // NVD: CVE-2004-2600

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-2600
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200412-549
value: MEDIUM

Trust: 0.6

VULHUB: VHN-11028
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-2600
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-11028
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-11028 // CNNVD: CNNVD-200412-549 // NVD: CVE-2004-2600

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-2600

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-549

TYPE

Design Error

Trust: 0.9

sources: BID: 10068 // CNNVD: CNNVD-200412-549

EXTERNAL IDS

db:BIDid:10068

Trust: 2.0

db:OSVDBid:4978

Trust: 1.7

db:NVDid:CVE-2004-2600

Trust: 1.7

db:SECUNIAid:11315

Trust: 1.7

db:CNNVDid:CNNVD-200412-549

Trust: 0.7

db:XFid:15775

Trust: 0.6

db:VULHUBid:VHN-11028

Trust: 0.1

sources: VULHUB: VHN-11028 // BID: 10068 // CNNVD: CNNVD-200412-549 // NVD: CVE-2004-2600

REFERENCES

url:http://support.intel.com/support/motherboards/server/sb/cs-010422.htm

Trust: 2.0

url:http://www.securityfocus.com/bid/10068

Trust: 1.7

url:ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf

Trust: 1.7

url:http://www.osvdb.org/4978

Trust: 1.7

url:http://secunia.com/advisories/11315

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/15775

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/15775

Trust: 0.6

sources: VULHUB: VHN-11028 // BID: 10068 // CNNVD: CNNVD-200412-549 // NVD: CVE-2004-2600

CREDITS

This issue was disclosed in the referenced Intel action alert.

Trust: 0.9

sources: BID: 10068 // CNNVD: CNNVD-200412-549

SOURCES

db:VULHUBid:VHN-11028
db:BIDid:10068
db:CNNVDid:CNNVD-200412-549
db:NVDid:CVE-2004-2600

LAST UPDATE DATE

2024-08-14T14:08:56.676000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-11028date:2017-07-11T00:00:00
db:BIDid:10068date:2004-04-07T00:00:00
db:CNNVDid:CNNVD-200412-549date:2006-01-23T00:00:00
db:NVDid:CVE-2004-2600date:2017-07-11T01:32:02.640

SOURCES RELEASE DATE

db:VULHUBid:VHN-11028date:2004-12-31T00:00:00
db:BIDid:10068date:2004-04-07T00:00:00
db:CNNVDid:CNNVD-200412-549date:2004-12-31T00:00:00
db:NVDid:CVE-2004-2600date:2004-12-31T05:00:00