CVE-2020-5208

HIGH

Ipmitool - Buffer Overflow

Title source: rule
STIX 2.1

Description

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.

References (8)

Core 8
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/02/msg00006.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00031.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202101-03
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/06/msg00029.html

Scores

CVSS v3 7.7
EPSS 0.0211
EPSS Percentile 84.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

Details

CWE
CWE-120
Status published
Products (6)
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 30
fedoraproject/fedora 31
ipmitool_project/ipmitool 1.8.18
opensuse/leap 15.1
Published Feb 05, 2020
Tracked Since Feb 18, 2026