Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-5208

Опубликовано: 05 фев. 2020
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.

A flaw was found in several functions of the IPMItool, where it failed to check data received from a LAN properly. An attacker could use this flaw to craft payloads, which can lead to a buffer overflow and also cause memory corruption, a denial of service, and remote code execution.

Отчет

The ipmitool package distributed with Red Hat Enterprise Linux versions are compiled using gcc's stack-protector feature. The stack canary generated by this feature helps mitigating any remote code execution attacks for this flaw.

Меры по смягчению последствий

There's no mitigation available for this issue, although a few actions help to reduce the attack risk:

  1. Avoid to run ipmitool as privileged user;
  2. Avoid to run ipmitool against non-trusted IPMI-enabled devices;

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1798721ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c

EPSS

Процентиль: 69%
0.00587
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
ubuntu
около 6 лет назад

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.

CVSS3: 7.7
nvd
около 6 лет назад

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.

CVSS3: 8.8
msrc
больше 5 лет назад

remote code execution vulnerability in ipmitool

CVSS3: 7.7
debian
около 6 лет назад

It's been found that multiple functions in ipmitool before 1.8.19 negl ...

suse-cvrf
почти 6 лет назад

Security update for ipmitool

EPSS

Процентиль: 69%
0.00587
Низкий

8.1 High

CVSS3