[Pkg-freeipmi-devel] CVE-2013-4786
Ferenc Wagner
wferi at niif.hu
Tue Jul 23 19:54:53 UTC 2013
Helmut Grohne <helmut at subdivi.de> writes:
> Please help with sorting out what (if any) action is required to handle
> CVE-2013-4786. Quoting the description:
>
>> The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange
>> Protocol (RAKP) authentication, which allows remote attackers to obtain
>> password hashes and conduct offline password guessing attacks by
>> obtaining the HMAC from a RAKP message 2 response from a BMC.
>
> [...] Please determine whether your package implements the relevant
> part of the IPMI specification and report back. If you have domain
> knowledge, shedding light on the impact of the issue would be nice.
Hi, freeipmi does implement RAKP. Looks like that is not a secure
protocol, but what can a client do about this? I'm not an expert,
though.
--
Regards,
Feri.
More information about the Pkg-freeipmi-devel
mailing list