Name | CVE-2020-5208 |
Description | It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2098-1, DLA-2699-1 |
Debian Bugs | 950761 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ipmitool (PTS) | bullseye | 1.8.18-10.1 | fixed |
bookworm | 1.8.19-4+deb12u2 | fixed | |
sid, trixie | 1.8.19-7.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ipmitool | source | jessie | 1.8.14-4+deb8u1 | DLA-2098-1 | ||
ipmitool | source | stretch | 1.8.18-3+deb9u1 | DLA-2699-1 | ||
ipmitool | source | buster | 1.8.18-6+deb10u1 | |||
ipmitool | source | (unstable) | 1.8.18-10.1 | 950761 |
https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10
https://github.com/ipmitool/ipmitool/commit/41d7026946fafbd4d1ec0bcaca3ea30a6e8eed22
https://github.com/ipmitool/ipmitool/commit/9452be87181a6e83cfcc768b3ed8321763db50e4
https://github.com/ipmitool/ipmitool/commit/d45572d71e70840e0d4c50bf48218492b79c1a10
https://github.com/ipmitool/ipmitool/commit/7ccea283dd62a05a320c1921e3d8d71a87772637