CVE-2026-33554
Buffer Overflow in FreeIPMI ipmi-oem Commands Enables Exploitation
Publication date: 2026-03-24
Last updated on: 2026-03-24
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freeipmi | freeipmi | to 1.16.17 (exc) |
| gnu | freeipmi | to 1.16.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the ipmi-oem client command of FreeIPMI versions before 1.16.17. It involves exploitable buffer overflows in response messages for three specific subcommands related to hardware vendor-specific IPMI OEM commands. These subcommands are used to retrieve information from servers made by Dell, Supermicro, and Wistron. The buffer overflow occurs when the response messages from these commands are processed, potentially allowing an attacker to exploit the overflow.
How can this vulnerability impact me? :
The buffer overflow vulnerability in ipmi-oem could allow an attacker to execute arbitrary code or cause a denial of service on affected systems by sending crafted response messages. Since ipmi-oem is used for system management tasks such as sensor reading and remote power control, exploitation could lead to unauthorized control or disruption of server management functions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know