Description
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2098-1 | ipmitool security update |
Debian DLA |
DLA-2699-1 | ipmitool security update |
EUVD |
EUVD-2020-26448 | It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19. |
Ubuntu USN |
USN-5997-1 | IPMItool vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T08:22:08.968Z
Reserved: 2020-01-02T00:00:00.000Z
Link: CVE-2020-5208
No data.
Status : Modified
Published: 2020-02-05T14:15:11.420
Modified: 2024-11-21T05:33:40.930
Link: CVE-2020-5208
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN