First published: Mon Oct 22 2018(Updated: )
In EDK II, a vulnerability exists in BaseUefiDecompressLib.c, TianoCompress.c, and UEFI specification via a stack-based buffer overflow in the MakeTable() function. An authenticated attacker could exploit this via a crafted file to escalate privileges. External Reference: <a href="https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-tianocompress-bounds-checking-issues.html">https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-tianocompress-bounds-checking-issues.html</a> Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=686">https://bugzilla.tianocore.org/show_bug.cgi?id=686</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TianoCore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1641458 is high due to a stack-based buffer overflow vulnerability that can be exploited to escalate privileges.
To fix REDHAT-BUG-1641458, you should apply the latest security updates for TianoCore EDK II that address this vulnerability.
TianoCore EDK II users are affected by REDHAT-BUG-1641458 if they are running versions vulnerable to the stack-based buffer overflow.
The vulnerability in REDHAT-BUG-1641458 is caused by insufficient bounds checking in the MakeTable() function within BaseUefiDecompressLib.c and TianoCompress.c.
Yes, an authenticated attacker could exploit REDHAT-BUG-1641458 by providing a crafted file that triggers the buffer overflow.