Impact
The vulnerability involves unbounded buffer copies on response messages in the ipmi-oem client of FreeIPMI. A maliciously crafted response from an IPMI server can overflow internal buffers when the client processes subcommands such as "ipmi-oem dell get-last-post-code", "ipmi-oem supermicro extra-firmware-info" or "ipmi-oem wistron read-proprietary-string". The overflow can corrupt memory, potentially allowing arbitrary code execution or denial‑of‑service on the host running the client. This weakness maps to CWE‑120 and CWE‑121.
Affected Systems
All installations of FreeIPMI version 1.16.16 or earlier that use the ipmi-oem client against supportedhardware are affected. The issue manifests when interacting with Dell, Supermicro or Wistron servers that support the specific OEM subcommands described. The affected products are the FreeIPMI suite on any operating system that can execute the ipmi-oem command.
Risk and Exploitability
The CVSS v3 score of 7.5 indicates significant impact, while the EPSS score is currently unavailable and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker to have network access to the IPMI interface and the ability to trigger the ipmi-oem commands, or a local user with sufficient privileges to run the client. The likely attack vector is remote, using crafted IPMI packets sent to a server that forwards responses back to the client, which then overflows its buffers.
OpenCVE Enrichment