CVE-2020-5208

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
GitHub_MCNA
7.7 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
ipmitool_projectipmitool
1.8.18
debiandebian_linux
8.0
debiandebian_linux
9.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ipmitool
bullseye
1.8.18-10.1
fixed
bookworm
1.8.19-4+deb12u1
fixed
trixie
1.8.19-7
fixed
sid
1.8.19-7.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ipmitool
noble
needed
mantic
ignored
lunar
ignored
kinetic
not-affected
jammy
not-affected
impish
ignored
hirsute
ignored
groovy
ignored
focal
Fixed 1.8.18-8ubuntu0.1
released
eoan
ignored
bionic
Fixed 1.8.18-5ubuntu0.2
released
xenial
Fixed 1.8.16-3ubuntu0.2+esm1
released
trusty
dne