First published: Mon Sep 24 2018(Updated: )
Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
Credit: secure@intel.com Intel Eclypsium Intel Eclypsium Intel Eclypsium Intel Eclypsium Intel Eclypsium secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovmf | <0:20180508-6.gitee3198e672e2.el7 | 0:20180508-6.gitee3198e672e2.el7 |
Tianocore EDK2 | <2017-11-07 | |
Apple macOS Mojave | <10.14 | 10.14 |
ubuntu/edk2 | <0~20180205. | 0~20180205. |
ubuntu/edk2 | <0~20160408. | 0~20160408. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5731 is a vulnerability in Tianocompress that can potentially enable an escalation of privilege via local access.
The severity of CVE-2017-5731 is medium, with a severity score of 6.7.
CVE-2017-5731 may affect you if you are using the affected version of Tianocompress before November 7, 2017.
To fix CVE-2017-5731, update to the remedy version 0:20180508-6.gitee3198e672e2.el7 of the ovmf package provided by Red Hat.
You can find more information about CVE-2017-5731 in the references provided: [CVE-2017-5731](https://www.cve.org/CVERecord?id=CVE-2017-5731), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2017-5731), [EDK II Security Advisory](https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-tianocompress-bounds-checking-issues.html), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1641442), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2019:2125).