First published: Mon Oct 19 2020(Updated: )
AuthenticodeVerify() calls OpenSSLs d2i_PKCS7() API to parse asn encoded signed authenticode pkcs#7 data. when this successfully returns, a type check is done by calling PKCS7_type_is_signed() and then Pkcs7->d.sign->contents->type is used. It is possible to construct an asn1 blob that successfully decodes and have d2i_PKCS7() return a valid pointer and have PKCS7_type_is_signed() also return success but have Pkcs7->d.sign be a NULL pointer. Reference: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=1914">https://bugzilla.tianocore.org/show_bug.cgi?id=1914</a>
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II | <2020-10-21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14584 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access in Tianocore EDK2.
CVE-2019-14584 has a severity value of 7.8, which is considered high.
Tianocore EDK2 versions up to and excluding 2020-10-21 are affected by CVE-2019-14584.
An authenticated user can potentially enable escalation of privilege via local access using CVE-2019-14584.
It is recommended to update Tianocore EDK2 to a version after 2020-10-21 to mitigate CVE-2019-14584.