Lucene search

K
archlinuxArchLinuxASA-202102-39
HistoryFeb 27, 2021 - 12:00 a.m.

[ASA-202102-39] ipmitool: arbitrary code execution

2021-02-2700:00:00
security.archlinux.org
250

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

82.0%

Arch Linux Security Advisory ASA-202102-39

Severity: High
Date : 2021-02-27
CVE-ID : CVE-2020-5208
Package : ipmitool
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1596

Summary

The package ipmitool before version 1.8.18-7 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 1.8.18-7.

pacman -Syu “ipmitool>=1.8.18-7”

The problem has been fixed upstream but no release is available yet.

Workaround

None.

Description

It’s been found that multiple functions in ipmitool before 1.8.19
neglect proper checking of the data received from a remote LAN party,
which may lead to buffer overflows and potentially to remote code
execution on the ipmitool side. This is especially dangerous if
ipmitool is run as a privileged user. This problem is fixed in version
1.8.19.

Impact

A remote server could execute arbitrary code on the client.

References

https://bugs.archlinux.org/task/69708
https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10
https://github.com/ipmitool/ipmitool/commit/41d7026946fafbd4d1ec0bcaca3ea30a6e8eed22
https://github.com/ipmitool/ipmitool/commit/9452be87181a6e83cfcc768b3ed8321763db50e4
https://github.com/ipmitool/ipmitool/commit/d45572d71e70840e0d4c50bf48218492b79c1a10
https://github.com/ipmitool/ipmitool/commit/7ccea283dd62a05a320c1921e3d8d71a87772637
https://security.archlinux.org/CVE-2020-5208

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyipmitool< 1.8.18-7UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

82.0%