ID

VAR-201312-0075


CVE

CVE-2013-3622


TITLE

SuperMicro of X9 Run on generation motherboard IPMI Vulnerabilities that allow arbitrary code to be executed in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2013-005498

DESCRIPTION

Buffer overflow in logout.cgi in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allows remote authenticated users to execute arbitrary code via the SID parameter. Supermicro IPMI is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers may be able to execute arbitrary code with root privileges in the context of the affected firmware. Failed exploit attempts will likely result in denial-of-service conditions. Supermicro IPMI running firmware versions prior to SMT_X9_315 are vulnerable. Supermicro Intelligent Platform Management Interface (IPMI) is an IPMI card (Intelligent Platform Management Interface) of Supermicro, which can remotely control the system, such as remote booting, entering BIOS, etc

Trust: 2.07

sources: NVD: CVE-2013-3622 // JVNDB: JVNDB-2013-005498 // BID: 64259 // VULHUB: VHN-63624 // VULMON: CVE-2013-3622

AFFECTED PRODUCTS

vendor:supermicromodel:intelligent platform managementscope:eqversion:2.24

Trust: 1.6

vendor:supermicromodel:intelligent platform managementscope:lteversion:2.26

Trust: 1.0

vendor:super micro computermodel:intelligent platform management interfacescope:ltversion:3.15 (smt_x9_315)

Trust: 0.8

vendor:supermicromodel:intelligent platform managementscope:eqversion:2.26

Trust: 0.6

vendor:supermodel:micro computer supermicro ipmi smt x9 226scope: - version: -

Trust: 0.3

vendor:supermodel:micro computer supermicro ipmi smt x9 224scope: - version: -

Trust: 0.3

vendor:supermodel:micro computer supermicro ipmi smt x9 315scope:neversion: -

Trust: 0.3

sources: BID: 64259 // JVNDB: JVNDB-2013-005498 // CNNVD: CNNVD-201312-172 // NVD: CVE-2013-3622

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3622
value: HIGH

Trust: 1.0

NVD: CVE-2013-3622
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201312-172
value: CRITICAL

Trust: 0.6

VULHUB: VHN-63624
value: HIGH

Trust: 0.1

VULMON: CVE-2013-3622
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-3622
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-63624
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63624 // VULMON: CVE-2013-3622 // JVNDB: JVNDB-2013-005498 // CNNVD: CNNVD-201312-172 // NVD: CVE-2013-3622

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-63624 // JVNDB: JVNDB-2013-005498 // NVD: CVE-2013-3622

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201312-172

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201312-172

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005498

PATCH

title:Top Pageurl:http://www.supermicro.com.tw/index_home.cfm

Trust: 0.8

title:Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmwareurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc

Trust: 0.1

sources: VULMON: CVE-2013-3622 // JVNDB: JVNDB-2013-005498

EXTERNAL IDS

db:NVDid:CVE-2013-3622

Trust: 2.9

db:BIDid:64259

Trust: 1.5

db:JVNDBid:JVNDB-2013-005498

Trust: 0.8

db:CNNVDid:CNNVD-201312-172

Trust: 0.7

db:VULHUBid:VHN-63624

Trust: 0.1

db:VULMONid:CVE-2013-3622

Trust: 0.1

sources: VULHUB: VHN-63624 // VULMON: CVE-2013-3622 // BID: 64259 // JVNDB: JVNDB-2013-005498 // CNNVD: CNNVD-201312-172 // NVD: CVE-2013-3622

REFERENCES

url:https://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities

Trust: 2.9

url:https://support.citrix.com/article/ctx216642

Trust: 1.6

url:http://www.securityfocus.com/bid/64259

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3622

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3622

Trust: 0.8

url:http://www.supermicro.com/support/bios/firmware0.aspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-63624 // VULMON: CVE-2013-3622 // BID: 64259 // JVNDB: JVNDB-2013-005498 // CNNVD: CNNVD-201312-172 // NVD: CVE-2013-3622

CREDITS

HD Moore of Rapid7

Trust: 0.3

sources: BID: 64259

SOURCES

db:VULHUBid:VHN-63624
db:VULMONid:CVE-2013-3622
db:BIDid:64259
db:JVNDBid:JVNDB-2013-005498
db:CNNVDid:CNNVD-201312-172
db:NVDid:CVE-2013-3622

LAST UPDATE DATE

2024-11-23T22:35:18.455000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63624date:2017-11-15T00:00:00
db:VULMONid:CVE-2013-3622date:2017-11-15T00:00:00
db:BIDid:64259date:2013-11-06T00:00:00
db:JVNDBid:JVNDB-2013-005498date:2013-12-16T00:00:00
db:CNNVDid:CNNVD-201312-172date:2013-12-12T00:00:00
db:NVDid:CVE-2013-3622date:2024-11-21T01:54:00.247

SOURCES RELEASE DATE

db:VULHUBid:VHN-63624date:2013-12-10T00:00:00
db:VULMONid:CVE-2013-3622date:2013-12-10T00:00:00
db:BIDid:64259date:2013-11-06T00:00:00
db:JVNDBid:JVNDB-2013-005498date:2013-12-16T00:00:00
db:CNNVDid:CNNVD-201312-172date:2013-12-12T00:00:00
db:NVDid:CVE-2013-3622date:2013-12-10T16:11:18.210