New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 5.9
SynopsisThe remote host is affected by a buffer overflow vulnerability.
DescriptionThe remote host is running iDRAC7 with a firmware version prior to 188.8.131.52, or iDRAC8 with a firmware version prior to 184.108.40.206, or iDRAC9 with a firmware version prior to 4.00.00.00 and is therefore affected by an buffer overflow vulnerability. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially crafted input data.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionUpdate the remote host to iDRAC7 firmware 220.127.116.11 or iDRAC8 firmware 18.104.22.168, or iDRAC9 firmware 4.00.00.00, or higher.