fkie_cve-2010-1460
Vulnerability from fkie_nvd
Published
2010-04-16 18:30
Modified
2024-11-21 01:14
Severity ?
Summary
The IBM BladeCenter with Advanced Management Module (AMM) firmware before bpet50g does not properly perform interrupt sharing for USB and iSCSI, which allows remote attackers to cause a denial of service (management module reboot) via TCP packets with malformed application data.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:*:c:*:*:*:*:*:*",
              "matchCriteriaId": "5E8D5B2E-3AB5-480F-B752-B8BA9A262C16",
              "versionEndIncluding": "2.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "478D3D8F-338F-494A-A3FF-5B1007DD90CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF211E79-BC73-4D6A-8153-19AEE82345D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "231325FC-D582-41B6-8CF4-07FEE414D19B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.20:f:*:*:*:*:*:*",
              "matchCriteriaId": "F2F265EA-4CDD-4B6F-9212-74D395F6034A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A01662B-8A72-4011-AA27-5A12C6B56FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.25:e:*:*:*:*:*:*",
              "matchCriteriaId": "9DFF42E1-162B-46EA-BDB6-E3452201550A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.25:i:*:*:*:*:*:*",
              "matchCriteriaId": "BBFF96E9-59AB-40D8-A531-7FB36A4B1E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.26:b:*:*:*:*:*:*",
              "matchCriteriaId": "EACAF1A3-EADC-4E15-AE0C-76F6E1FE5219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.26:e:*:*:*:*:*:*",
              "matchCriteriaId": "0E5AA726-67C7-43EF-AB4C-DC9EC2AB39A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.26:h:*:*:*:*:*:*",
              "matchCriteriaId": "0B967754-11D2-4903-AB8E-6608FD0FD836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.26:i:*:*:*:*:*:*",
              "matchCriteriaId": "1F293BB5-4169-49EC-8DF4-3F0575F7F4D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.26:k:*:*:*:*:*:*",
              "matchCriteriaId": "178B4552-5FE7-439F-86C4-5123F23F4117",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.28:g:*:*:*:*:*:*",
              "matchCriteriaId": "F58BC7F2-438E-4681-9741-7A8DC581DE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.32:d:*:*:*:*:*:*",
              "matchCriteriaId": "86CF34AF-A48D-4CE0-9144-5209A16C9C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.34:b:*:*:*:*:*:*",
              "matchCriteriaId": "A555F94B-2D23-4ED6-947C-CBEC1A2768C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.34:e:*:*:*:*:*:*",
              "matchCriteriaId": "AEC68099-D84F-4516-8D6A-3580F49DF4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.36:d:*:*:*:*:*:*",
              "matchCriteriaId": "304A13AA-E04B-43B6-84DD-3235170F5C55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.36:g:*:*:*:*:*:*",
              "matchCriteriaId": "F26C2C6D-D2E1-42D6-A700-53AD1D3A3876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.36:h:*:*:*:*:*:*",
              "matchCriteriaId": "5F61FF30-2B40-44A3-8257-69E92EC0DE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.36:k:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B6195-649E-4577-99F3-B04C0B762FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:d:*:*:*:*:*:*",
              "matchCriteriaId": "377C2D86-620B-4BC8-A118-9B52EBC609D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:f:*:*:*:*:*:*",
              "matchCriteriaId": "E9BB015A-30D6-4942-BAC6-DD96E151B8CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:i:*:*:*:*:*:*",
              "matchCriteriaId": "7B916267-C840-48C5-B3DC-73BCDA9C91C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:n:*:*:*:*:*:*",
              "matchCriteriaId": "6D979D22-C158-41DE-8AFA-EF3C040B1F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:o:*:*:*:*:*:*",
              "matchCriteriaId": "66B0F30E-1E3F-4BD4-BE24-0A26C4CA56E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:1.42:t:*:*:*:*:*:*",
              "matchCriteriaId": "2C927655-9D61-4921-AA51-27E7D6A2007C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.46:c:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4EBB8-760C-4DA6-8404-3BB104D08656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.46:j:*:*:*:*:*:*",
              "matchCriteriaId": "C65476D1-5104-4DE1-B0DF-FBD811F74ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.48:c:*:*:*:*:*:*",
              "matchCriteriaId": "A2F8CD93-5278-43F6-87E0-0FED8ACD330A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.48:d:*:*:*:*:*:*",
              "matchCriteriaId": "6460DE58-67FA-44AE-B20F-A60BAC07F516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.48:g:*:*:*:*:*:*",
              "matchCriteriaId": "54EAE737-288C-4F0E-A510-44C8B4B94E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.48:l:*:*:*:*:*:*",
              "matchCriteriaId": "4DF194B0-B7BE-47AF-907D-214AF43DEFE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:advanced_management_module:2.48:n:*:*:*:*:*:*",
              "matchCriteriaId": "D29A5D9C-E5F7-4228-A63F-82F2A55E242E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:bladecenter:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C9F62C-79C0-4079-824C-E076DA20CE2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IBM BladeCenter with Advanced Management Module (AMM) firmware before bpet50g does not properly perform interrupt sharing for USB and iSCSI, which allows remote attackers to cause a denial of service (management module reboot) via TCP packets with malformed application data."
    },
    {
      "lang": "es",
      "value": "El firmware IBM BladeCenter con Advanced Management Module (AMM) anterior bpet50g no realiza la interrupci\u00f3n compartida adecuadamente para USB y iSCSI, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio m\u00f3dulo de gesti\u00f3n) a trav\u00e9s de paquetes TCP con datos de programa malformados. \r\n"
    }
  ],
  "id": "CVE-2010-1460",
  "lastModified": "2024-11-21T01:14:28.333",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-16T18:30:00.413",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://dsecrg.com/pages/vul/show.php?id=149"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-5083945\u0026brandind=5000020"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/510744/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/39499"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dsecrg.com/pages/vul/show.php?id=149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-5083945\u0026brandind=5000020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/510744/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/39499"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.