Vulnerabilities > CVE-2012-3271 - Unspecified vulnerability in HP products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
hp
nessus

Summary

Unspecified vulnerability on the HP Integrated Lights-Out 3 (aka iLO3) with firmware before 1.50 and Integrated Lights-Out 4 (aka iLO4) with firmware before 1.13 allows remote attackers to obtain sensitive information via unknown vectors.

Nessus

  • NASL familyCGI abuses
    NASL idILO_HPSBHF_02821.NASL
    descriptionAn information disclosure vulnerability exists in Integrated Lights-Out due to an unspecified vulnerability. An unauthenticated, remote attacker can exploit this to disclose potentially sensitive information.
    last seen2020-06-01
    modified2020-06-02
    plugin id122189
    published2019-02-14
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122189
    titleiLO 3 < 1.50 / iLO 4 < 1.13 Information Disclosure Vulnerability
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(122189);
      script_version("1.4");
      script_cvs_date("Date: 2019/10/31 15:18:51");
    
      script_cve_id("CVE-2012-3271");
      script_bugtraq_id(56597);
    
      script_name(english:"iLO 3 < 1.50 / iLO 4 < 1.13 Information Disclosure Vulnerability");
      script_summary(english:"Checks version of HP Integrated Lights-Out (iLO).");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote HP Integrated Lights-Out (iLO) server's web interface is
    affected by an information disclosure vulnerability.");
      script_set_attribute(attribute:"description", value:
    "An information disclosure vulnerability exists in Integrated 
    Lights-Out due to an unspecified vulnerability. 
    An unauthenticated, remote attacker can exploit this to 
    disclose potentially sensitive information.");
      # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c03515413&docLocale=en_US
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6d1b5324");
      script_set_attribute(attribute:"solution", value:
    "For iLO 3, upgrade firmware to 1.50 or later. 
     For iLO 4, upgrade firmware to 1.13 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3271");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/11/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/14");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:integrated_lights-out_firmware");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CGI abuses");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ilo_detect.nasl");
      script_require_keys("www/ilo", "ilo/generation", "ilo/firmware");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    include('http.inc');
    include('vcf.inc');
    include('vcf_extras.inc');
    
    port = get_http_port(default:80, embedded: TRUE);
    app_info = vcf::get_app_info(app:'ilo', port:port, webapp:TRUE);
    
    constraints = [
      {'generation' : '3', 'fixed_version' : '1.50'},
      {'generation' : '4', 'fixed_version' : '1.13'} 
    ];
    vcf::ilo::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    
    
  • NASL familyMisc.
    NASL idILO_INFO_DISCLOSURE.NASL
    descriptionAccording to its version number, the remote HP Integrated Lights-Out (iLO) server is affected by an unspecified information disclosure vulnerability.
    last seen2020-06-01
    modified2020-06-02
    plugin id69816
    published2013-09-09
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69816
    titleiLO 3 < 1.50 / iLO 4 < 1.13 Unspecified Information Disclosure
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69816);
      script_version("1.2");
      script_cvs_date("Date: 2018/07/12 19:01:16");
    
      script_cve_id("CVE-2012-3271");
      script_bugtraq_id(56597);
    
      script_name(english:"iLO 3 < 1.50 / iLO 4 < 1.13 Unspecified Information Disclosure");
      script_summary(english:"Checks version of HP Integrated Lights-Out (iLO).");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote HP Integrated Lights-Out (iLO) server has an unspecified
    information disclosure vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its version number, the remote HP Integrated Lights-Out
    (iLO) server is affected by an unspecified information disclosure
    vulnerability.");
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515413
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2300d65c");
      script_set_attribute(attribute:"solution", value:
    "For HP Integrated Lights-Out (iLO) 3, upgrade firmware to 1.50 or
    later. For iLO 4, upgrade firmware to 1.13 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/10/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/09");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:integrated_lights-out_3_firmware");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:integrated_lights-out_4_firmware");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ilo_detect.nasl");
      script_require_keys("Settings/ParanoidReport", "ilo/generation", "ilo/firmware");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    if (report_paranoia < 2)
      audit(AUDIT_PARANOID);
    
    # Each generation has its own series of firmware version numbers.
    generation = get_kb_item_or_exit("ilo/generation");
    version = get_kb_item_or_exit("ilo/firmware");
    
    # Firmware is unique to the generation of iLO.
    if (generation == 3)
      fixed_version = "1.50";
    else if (generation == 4)
      fixed_version = "1.13";
    else
      audit(AUDIT_INST_VER_NOT_VULN, "iLO " + generation, version);
    
    if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) >= 0)
      audit(AUDIT_INST_VER_NOT_VULN, "iLO " + generation, version);
    
    report = NULL;
    if (report_verbosity > 0)
    {
      report =
        '\n Generation       : ' + generation +
        '\n Firmware version : ' + version +
        '\n Fixed version    : ' + fixed_version +
        '\n';
    }
    
    # Which service/port is vulnerable is unspecified in the bulletin.
    security_hole(port:0, extra:report);