It's been found that multiple functions in ipmitool 1.8.18 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user.
All users of ipmitool are potentially affected.
Version 1.8.19 will have this problem fixed.
There are no workarounds to completely remediate the vulnerability, but possibility of it being exploited can be significantly lowered by:
- Not running ipmitool as a privileged user
- Not running ipmitool over demilitarized network or against untrusted IPMI-enabled devices
It's not just a single patch, it's a whole series of them and they depend on other commits post 1.8.18.
I'm not sure of upstream's release schedule for 1.8.19 yet, punting to wait for upstream.