Arch Linux Security Advisory ASA-202102-39
=========================================
Severity: High
Date    : 2021-02-27
CVE-ID  : CVE-2020-5208
Package : ipmitool
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1596

Summary
======
The package ipmitool before version 1.8.18-7 is vulnerable to arbitrary
code execution.

Resolution
=========
Upgrade to 1.8.18-7.

# pacman -Syu "ipmitool>=1.8.18-7"

The problem has been fixed upstream but no release is available yet.

Workaround
=========
None.

Description
==========
It's been found that multiple functions in ipmitool before 1.8.19
neglect proper checking of the data received from a remote LAN party,
which may lead to buffer overflows and potentially to remote code
execution on the ipmitool side. This is especially dangerous if
ipmitool is run as a privileged user. This problem is fixed in version
1.8.19.

Impact
=====
A remote server could execute arbitrary code on the client.

References
=========
https://bugs.archlinux.org/task/69708
https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10
https://github.com/ipmitool/ipmitool/commit/41d7026946fafbd4d1ec0bcaca3ea30a6e8eed22
https://github.com/ipmitool/ipmitool/commit/9452be87181a6e83cfcc768b3ed8321763db50e4
https://github.com/ipmitool/ipmitool/commit/d45572d71e70840e0d4c50bf48218492b79c1a10
https://github.com/ipmitool/ipmitool/commit/7ccea283dd62a05a320c1921e3d8d71a87772637
https://security.archlinux.org/CVE-2020-5208

ArchLinux: 202102-39: ipmitool: arbitrary code execution

March 1, 2021

Summary

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.

Resolution

Upgrade to 1.8.18-7. # pacman -Syu "ipmitool>=1.8.18-7"
The problem has been fixed upstream but no release is available yet.

References

https://bugs.archlinux.org/task/69708 https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2 https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10 https://github.com/ipmitool/ipmitool/commit/41d7026946fafbd4d1ec0bcaca3ea30a6e8eed22 https://github.com/ipmitool/ipmitool/commit/9452be87181a6e83cfcc768b3ed8321763db50e4 https://github.com/ipmitool/ipmitool/commit/d45572d71e70840e0d4c50bf48218492b79c1a10 https://github.com/ipmitool/ipmitool/commit/7ccea283dd62a05a320c1921e3d8d71a87772637 https://security.archlinux.org/CVE-2020-5208

Severity
Package : ipmitool
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1596

Workaround

None.

Related News