Unrated severityNVD Advisory· Published Dec 15, 2011· Updated Apr 29, 2026
CVE-2011-4339
CVE-2011-4339
Description
ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.
Affected products
1- cpe:2.3:a:ipmitool_project:ipmitool:1.8.11:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatch
- lists.fedoraproject.org/pipermail/package-announce/2012-January/071575.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2012-January/071580.htmlnvdThird Party Advisory
- openwall.com/lists/oss-security/2011/12/13/1nvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-0123.htmlnvdThird Party Advisory
- www.debian.org/security/2011/dsa-2376nvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-1814.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/51036nvdThird Party AdvisoryVDB Entry
- www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfnvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/71763nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/47173nvdBroken Link
- secunia.com/advisories/47228nvdBroken Link
- secunia.com/advisories/47376nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
News mentions
0No linked articles in our index yet.