[Pkg-freeipmi-devel] CVE-2013-4786

Ferenc Wagner wferi at niif.hu
Tue Jul 23 19:54:53 UTC 2013


Helmut Grohne <helmut at subdivi.de> writes:

> Please help with sorting out what (if any) action is required to handle
> CVE-2013-4786. Quoting the description:
>
>> The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange
>> Protocol (RAKP) authentication, which allows remote attackers to obtain
>> password hashes and conduct offline password guessing attacks by
>> obtaining the HMAC from a RAKP message 2 response from a BMC.
>
> [...] Please determine whether your package implements the relevant
> part of the IPMI specification and report back.  If you have domain
> knowledge, shedding light on the impact of the issue would be nice.

Hi, freeipmi does implement RAKP.  Looks like that is not a secure
protocol, but what can a client do about this?  I'm not an expert,
though.
-- 
Regards,
Feri.



More information about the Pkg-freeipmi-devel mailing list