Vulnerabilites related to Extensible Firmware Interface Development Kit (EDK II) - Extensible Firmware Interface Development Kit (EDK II)
cve-2018-12181
Vulnerability from cvelistv5
Published
2019-03-27 19:23
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/stack-overflow-on-corrupted-bmp.html | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/ | vendor-advisory, x_refsource_FEDORA | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2019:2125 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3338 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/4349-1/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.638Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/stack-overflow-on-corrupted-bmp.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "openSUSE-SU-2019:1139", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00030.html", }, { name: "openSUSE-SU-2019:1172", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:3338", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:3338", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4349-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-07T14:06:04", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/stack-overflow-on-corrupted-bmp.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "openSUSE-SU-2019:1139", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00030.html", }, { name: "openSUSE-SU-2019:1172", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:3338", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:3338", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4349-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12181", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/stack-overflow-on-corrupted-bmp.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/stack-overflow-on-corrupted-bmp.html", }, { name: "FEDORA-2019-bff1cbaba3", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "openSUSE-SU-2019:1139", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00030.html", }, { name: "openSUSE-SU-2019:1172", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html", }, { name: "RHSA-2019:2125", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:3338", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:3338", }, { name: "USN-4349-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4349-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12181", datePublished: "2019-03-27T19:23:00", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:59.638Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-3613
Vulnerability from cvelistv5
Published
2019-03-27 19:16
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/ | vendor-advisory, x_refsource_FEDORA | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:2125 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T04:50:30.189Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Information Disclosure and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-06T16:06:12", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-3613", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Information Disclosure and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/authvariable-timestamp-zeroing-on-append_write.html", }, { name: "FEDORA-2019-bff1cbaba3", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:2125", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2125", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-3613", datePublished: "2019-03-27T19:16:58", dateReserved: "2017-12-28T00:00:00", dateUpdated: "2024-08-05T04:50:30.189Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12179
Vulnerability from cvelistv5
Published
2019-03-27 19:21
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.601Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Information Disclosure and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-15T19:06:09", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12179", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Information Disclosure and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12179", datePublished: "2019-03-27T19:21:22", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:59.601Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12178
Vulnerability from cvelistv5
Published
2019-03-27 19:19
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/ | vendor-advisory, x_refsource_FEDORA | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4349-1/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.170Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html", }, { name: "openSUSE-SU-2019:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4349-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-07T14:06:06", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html", }, { name: "openSUSE-SU-2019:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4349-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12178", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html", }, { name: "openSUSE-SU-2019:1083", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "USN-4349-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4349-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12178", datePublished: "2019-03-27T19:19:31", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:59.170Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-0161
Vulnerability from cvelistv5
Published
2019-03-27 19:23
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2019:2125 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2437 | vendor-advisory, x_refsource_REDHAT | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:44:14.759Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html", }, { name: "openSUSE-SU-2019:1352", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html", }, { name: "openSUSE-SU-2019:1425", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:2437", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2437", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, { name: "[debian-lts-announce] 20210429 [SECURITY] [DLA 2645-1] edk2 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-29T21:06:25", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html", }, { name: "openSUSE-SU-2019:1352", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html", }, { name: "openSUSE-SU-2019:1425", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html", }, { name: "RHSA-2019:2125", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:2437", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2437", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, { name: "[debian-lts-announce] 20210429 [SECURITY] [DLA 2645-1] edk2 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-0161", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html", }, { name: "openSUSE-SU-2019:1352", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html", }, { name: "openSUSE-SU-2019:1425", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html", }, { name: "RHSA-2019:2125", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { name: "RHSA-2019:2437", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2437", }, { name: "FEDORA-2019-d47a9d4b8b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, { name: "[debian-lts-announce] 20210429 [SECURITY] [DLA 2645-1] edk2 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-0161", datePublished: "2019-03-27T19:23:44", dateReserved: "2018-11-13T00:00:00", dateUpdated: "2024-08-04T17:44:14.759Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12182
Vulnerability from cvelistv5
Published
2019-03-27 19:18
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/107648 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.301Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html", }, { name: "107648", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Information Disclosure and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-15T19:06:09", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html", }, { name: "107648", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107648", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12182", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Information Disclosure and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html", }, { name: "107648", refsource: "BID", url: "http://www.securityfocus.com/bid/107648", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12182", datePublished: "2019-03-27T19:18:40", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:59.301Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12180
Vulnerability from cvelistv5
Published
2019-03-27 19:22
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/ | vendor-advisory, x_refsource_FEDORA | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:0809 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:0968 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:1116 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/4349-1/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:58.414Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html", }, { name: "openSUSE-SU-2019:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:0809", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:0809", }, { name: "RHSA-2019:0968", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:0968", }, { name: "RHSA-2019:1116", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1116", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4349-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Information Disclosure and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-07T14:06:05", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html", }, { name: "openSUSE-SU-2019:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:0809", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:0809", }, { name: "RHSA-2019:0968", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:0968", }, { name: "RHSA-2019:1116", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1116", }, { name: "USN-4349-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4349-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12180", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Information Disclosure and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html", }, { name: "openSUSE-SU-2019:1083", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html", }, { name: "FEDORA-2019-bff1cbaba3", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "RHSA-2019:0809", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0809", }, { name: "RHSA-2019:0968", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0968", }, { name: "RHSA-2019:1116", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1116", }, { name: "USN-4349-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4349-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12180", datePublished: "2019-03-27T19:22:10", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:58.414Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12183
Vulnerability from cvelistv5
Published
2019-03-27 19:17
Modified
2024-08-05 08:30
Severity ?
EPSS score ?
Summary
Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/107643 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Extensible Firmware Interface Development Kit (EDK II) | Extensible Firmware Interface Development Kit (EDK II) |
Version: N/A |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:30:59.824Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html", }, { name: "107643", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Extensible Firmware Interface Development Kit (EDK II)", vendor: "Extensible Firmware Interface Development Kit (EDK II)", versions: [ { status: "affected", version: "N/A", }, ], }, ], datePublic: "2019-03-26T00:00:00", descriptions: [ { lang: "en", value: "Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Information Disclosure and/or Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-15T19:06:09", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html", }, { name: "107643", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107643", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2018-12183", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Extensible Firmware Interface Development Kit (EDK II)", version: { version_data: [ { version_value: "N/A", }, ], }, }, ], }, vendor_name: "Extensible Firmware Interface Development Kit (EDK II)", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Information Disclosure and/or Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html", refsource: "CONFIRM", url: "https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html", }, { name: "107643", refsource: "BID", url: "http://www.securityfocus.com/bid/107643", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us", }, { name: "FEDORA-2019-d47a9d4b8b", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2018-12183", datePublished: "2019-03-27T19:17:46", dateReserved: "2018-06-11T00:00:00", dateUpdated: "2024-08-05T08:30:59.824Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }