First published: Mon Oct 22 2018(Updated: )
In EDK II, a vulnerability exists in TianoCompress.c (BaseTools/Source/C/TianoCompress) from github/tianocore/edk2. An authenticated attacker could exploit this via a crafted file to escalate privileges. External Reference: <a href="https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-tianocompress-bounds-checking-issues.html">https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-tianocompress-bounds-checking-issues.html</a> Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=686">https://bugzilla.tianocore.org/show_bug.cgi?id=686</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TianoCore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1641442 is classified as a medium severity vulnerability.
To fix REDHAT-BUG-1641442, apply the latest security patches provided for the TianoCore EDK II.
REDHAT-BUG-1641442 affects users and systems running TianoCore EDK II that allow authenticated file uploads.
REDHAT-BUG-1641442 is a privilege escalation vulnerability due to improper checks in the TianoCompress.c file.
No, REDHAT-BUG-1641442 requires authentication for exploitation as it targets authenticated users.