PT-2014-25: Stack-Based Buffer Overflow in HP iLO

(PT-2014-25) Positive Technologies Security Advisory
Stack-Based Buffer Overflow in HP iLO

Vulnerable software

HP Integrated Lights-Out 4 (iLO 4)
Version: 2.02 and earlier

HP Integrated Lights-Out 2 (iLO 2)
Version: 2.26 and earlier

HP Integrated Lights-Out Chassis Management (iLO CM)
Version: 1.29 and earlier


Severity level

Severity level: High
Impact: Remote Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 10
Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE: CVE-2014-7876

Software description

HP Integrated Lights-Out is a remote management tool for servers that requires no physical access.

Vulnerability description

The specialists of the Positive Research center have detected a Stack-Based Buffer Overflow vulnerability in HP iLO.

This vulnerability allows remote attackers to execute arbitrary code

How to fix

Update your software up to the latest version

Advisory status

22.09.2014 - Vendor gets vulnerability details
17.03.2015 - Vendor releases fixed version and details
17.11.2015 - Public disclosure


The vulnerability was detected by Alexander Tlyapov, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research:

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+