Vulnerabilities > CVE-2011-4339 - Incorrect Permission Assignment for Critical Resource vulnerability in Ipmitool Project Ipmitool 1.8.11

047910
CVSS 3.6 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
ipmitool-project
CWE-732
nessus

Summary

ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.

Vulnerable Configurations

Part Description Count
Application
Ipmitool_Project
1
OS
Redhat
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Accessing Functionality Not Properly Constrained by ACLs
    In applications, particularly web applications, access to functionality is mitigated by the authorization framework, whose job it is to map ACLs to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application or can run queries for data that he is otherwise not supposed to.
  • Privilege Abuse
    An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources. If access control mechanisms are absent or misconfigured, a user may be able to access resources that are intended only for higher level users. An adversary may be able to exploit this to utilize a less trusted account to gain information and perform activities reserved for more trusted accounts. This attack differs from privilege escalation and other privilege stealing attacks in that the adversary never actually escalates their privileges but instead is able to use a lesser degree of privilege to access resources that should be (but are not) reserved for higher privilege accounts. Likewise, the adversary does not exploit trust or subvert systems - all control functionality is working as configured but the configuration does not adequately protect sensitive resources at an appropriate level.
  • Directory Indexing
    An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files, configuration files, user accounts, script contents, as well as naming conventions, all of which can be used by an attacker to mount additional attacks.
  • Accessing, Modifying or Executing Executable Files
    An attack of this type exploits a system's configuration that allows an attacker to either directly access an executable file, for example through shell access; or in a possible worst case allows an attacker to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.
  • Exploiting Incorrectly Configured Access Control Security Levels
    An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack. Most commonly, attackers would take advantage of controls that provided too little protection for sensitive activities in order to perform actions that should be denied to them. In some circumstances, an attacker may be able to take advantage of overly restrictive access control policies, initiating denial of services (if an application locks because it unexpectedly failed to be granted access) or causing other legitimate actions to fail due to security. The latter class of attacks, however, is usually less severe and easier to detect than attacks based on inadequate security restrictions. This attack pattern differs from CAPEC 1, "Accessing Functionality Not Properly Constrained by ACLs" in that the latter describes attacks where sensitive functionality lacks access controls, where, in this pattern, the access control is present, but incorrectly configured.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-17065.NASL
    descriptionThis update fixes following security bug: CVE-2011-4339 - OpenIPMI: IPMI event daemon creates PID file with world writeable permissions Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id57419
    published2012-01-03
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57419
    titleFedora 16 : ipmitool-1.8.11-8.fc16 (2011-17065)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1850.NASL
    descriptionAn updated rhev-hypervisor6 package that fixes one security issue and two bugs is now available. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. Using the SG_IO IOCTL to issue SCSI requests to partitions or LVM volumes resulted in the requests being passed to the underlying block device. If a privileged user only had access to a single partition or LVM volume, they could use this flaw to bypass those restrictions and gain read and write access (and be able to issue other SCSI commands) to the entire block device. In KVM (Kernel-based Virtual Machine) environments using raw format virtio disks backed by a partition or LVM volume, a privileged guest user could bypass intended restrictions and issue read and write requests (and other SCSI commands) on the host, and possibly access the data of other guests that reside on the same underlying block device. Refer to Red Hat Bugzilla bug 752375 for further details and a mitigation script for users who cannot apply this update immediately. (CVE-2011-4127) This updated package provides updated components that include fixes for various security issues. These issues have no security impact on Red Hat Enterprise Virtualization Hypervisor itself, however. The security fixes included in this update address the following CVE numbers : CVE-2011-4539 (dhcp issue) CVE-2011-4339 (ipmitool issue) CVE-2011-1530 (krb5 issue) This update also fixes the following bugs : * Virtual LAN (VLAN) identifiers containing a space were accepted, even though they could not be configured correctly. With this update, VLAN identifiers containing a space are rejected with an
    last seen2020-06-01
    modified2020-06-02
    plugin id79281
    published2014-11-17
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79281
    titleRHEL 6 : rhev-hypervisor6 (RHSA-2011:1850)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1814.NASL
    descriptionAn updated ipmitool package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id57295
    published2011-12-14
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57295
    titleRHEL 6 : ipmitool (RHSA-2011:1814)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111213_IPMITOOL_ON_SL6_X.NASL
    descriptionThe ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id61206
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61206
    titleScientific Linux Security Update : ipmitool on SL6.x i386/x86_64
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0123.NASL
    descriptionFrom Red Hat Security Advisory 2013:0123 : Updated OpenIPMI packages that fix one security issue, multiple bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The OpenIPMI packages provide command line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) Note: This issue did not affect the default configuration of OpenIPMI as shipped with Red Hat Enterprise Linux 5. This update also fixes the following bugs : * Prior to this update, the ipmitool utility first checked the IPMI hardware for Dell IPMI extensions and listed only supported commands when printing command usage like the option
    last seen2020-06-01
    modified2020-06-02
    plugin id68694
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68694
    titleOracle Linux 5 : OpenIPMI (ELSA-2013-0123)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-17071.NASL
    descriptionThis update fixes following security bug: CVE-2011-4339 - OpenIPMI: IPMI event daemon creates PID file with world writeable permissions Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id57420
    published2012-01-03
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57420
    titleFedora 15 : ipmitool-1.8.11-7.fc15 (2011-17071)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-196.NASL
    descriptionA vulnerability has been discovered and corrected in ipmitool : ipmievd as used in the ipmitool package uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file (CVE-2011-4339). In Mandriva the ipmievd daemon from the ipmitool package does not have an initscript to start and stop the service, however one could rather easily craft an initscript or start the service by other means rendering the system vulnerable to this issue. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id57413
    published2011-12-29
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57413
    titleMandriva Linux Security Advisory : ipmitool (MDVSA-2011:196)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1814.NASL
    descriptionFrom Red Hat Security Advisory 2011:1814 : An updated ipmitool package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id68405
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68405
    titleOracle Linux 6 : ipmitool (ELSA-2011-1814)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-1814.NASL
    descriptionAn updated ipmitool package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id57379
    published2011-12-23
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57379
    titleCentOS 6 : ipmitool (CESA-2011:1814)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0123.NASL
    descriptionUpdated OpenIPMI packages that fix one security issue, multiple bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The OpenIPMI packages provide command line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) Note: This issue did not affect the default configuration of OpenIPMI as shipped with Red Hat Enterprise Linux 5. This update also fixes the following bugs : * Prior to this update, the ipmitool utility first checked the IPMI hardware for Dell IPMI extensions and listed only supported commands when printing command usage like the option
    last seen2020-06-01
    modified2020-06-02
    plugin id63568
    published2013-01-17
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63568
    titleCentOS 5 : OpenIPMI (CESA-2013:0123)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130108_OPENIPMI_ON_SL5_X.NASL
    descriptionIt was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) Note: This issue did not affect the default configuration of OpenIPMI as shipped with Scientific Linux 5. This update also fixes the following bugs : - Prior to this update, the ipmitool utility first checked the IPMI hardware for Dell IPMI extensions and listed only supported commands when printing command usage like the option
    last seen2020-03-18
    modified2013-01-17
    plugin id63601
    published2013-01-17
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63601
    titleScientific Linux Security Update : OpenIPMI on SL5.x i386/x86_64 (20130108)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0123.NASL
    descriptionUpdated OpenIPMI packages that fix one security issue, multiple bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The OpenIPMI packages provide command line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) Note: This issue did not affect the default configuration of OpenIPMI as shipped with Red Hat Enterprise Linux 5. This update also fixes the following bugs : * Prior to this update, the ipmitool utility first checked the IPMI hardware for Dell IPMI extensions and listed only supported commands when printing command usage like the option
    last seen2020-06-01
    modified2020-06-02
    plugin id63406
    published2013-01-08
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63406
    titleRHEL 5 : OpenIPMI (RHSA-2013:0123)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_IPMITOOL_20121120.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file. (CVE-2011-4339)
    last seen2020-06-01
    modified2020-06-02
    plugin id80645
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80645
    titleOracle Solaris Third-Party Patch Update : ipmitool (cve_2011_4339_access_controls)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2376.NASL
    descriptionIt was discovered that OpenIPMI, the Intelligent Platform Management Interface library and tools, used too wide permissions PID file, which allows local users to kill arbitrary processes by writing to this file.
    last seen2020-03-17
    modified2012-01-12
    plugin id57516
    published2012-01-12
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57516
    titleDebian DSA-2376-2 : ipmitool - insecure PID file

Redhat

advisories
  • bugzilla
    id742837
    titleCVE-2011-4339 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • commentipmitool is earlier than 0:1.8.11-12.el6_2.1
        ovaloval:com.redhat.rhsa:tst:20111814001
      • commentipmitool is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhsa:tst:20111814002
    rhsa
    idRHSA-2011:1814
    released2011-12-13
    severityModerate
    titleRHSA-2011:1814: ipmitool security update (Moderate)
  • bugzilla
    id829705
    titleinitscript of ipmi contains incomplete path and cannot start by certain users
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentOpenIPMI-tools is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123001
          • commentOpenIPMI-tools is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123002
        • AND
          • commentOpenIPMI is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123003
          • commentOpenIPMI is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123004
        • AND
          • commentOpenIPMI-python is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123005
          • commentOpenIPMI-python is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123006
        • AND
          • commentOpenIPMI-gui is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123007
          • commentOpenIPMI-gui is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123008
        • AND
          • commentOpenIPMI-libs is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123009
          • commentOpenIPMI-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123010
        • AND
          • commentOpenIPMI-perl is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123011
          • commentOpenIPMI-perl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123012
        • AND
          • commentOpenIPMI-devel is earlier than 0:2.0.16-16.el5
            ovaloval:com.redhat.rhsa:tst:20130123013
          • commentOpenIPMI-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20130123014
    rhsa
    idRHSA-2013:0123
    released2013-01-08
    severityLow
    titleRHSA-2013:0123: OpenIPMI security, bug fix, and enhancement update (Low)
rpms
  • ipmitool-0:1.8.11-12.el6_2.1
  • ipmitool-debuginfo-0:1.8.11-12.el6_2.1
  • OpenIPMI-0:2.0.16-16.el5
  • OpenIPMI-debuginfo-0:2.0.16-16.el5
  • OpenIPMI-devel-0:2.0.16-16.el5
  • OpenIPMI-gui-0:2.0.16-16.el5
  • OpenIPMI-libs-0:2.0.16-16.el5
  • OpenIPMI-perl-0:2.0.16-16.el5
  • OpenIPMI-python-0:2.0.16-16.el5
  • OpenIPMI-tools-0:2.0.16-16.el5