SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE integrated Lights Out (iLO) Vendors:   HPE
HPE integrated Lights Out (iLO) Unspecified Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1041649
SecurityTracker URL:  http://securitytracker.com/id/1041649
CVE Reference:   CVE-2018-7105, CVE-2018-7106   (Links to External Site)
Date:  Sep 13 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in HPE integrated Lights Out (iLO). A remote user can execute arbitrary code on the target system. A remote user can obtain potentially sensitive information on the target system.

A remote user can execute arbitrary code on the target system [CVE-2018-7105].

A remote user can view potentially sensitive information on the target system [CVE-2018-7106].

[Editor's note: The vendor-supplied CVSS score for the "remote execution of arbitrary code" vulerability indicates a "local" attack vector (AV).]

Le bureau Analyse de Codes et Signatures de l'ANSSI (ACS, formerly BFS) reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (3 v1.90, 4 v2.61, 5 v1.35).

The vendor advisory is available at:

https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03866en_us

Vendor URL:  support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03866en_us (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC