First published: Mon May 03 2021(Updated: )
Function IscsiMisc.c:IScsiHexToBin() in NetworkPkg/IScsiDxe does not correctly check the sizes of the input and output buffers, allowing an attacker who can control the input buffer to cause a buffer overflow in the destination buffer. Function IScsiHexToBin is used to decode strings passed as part of iSCSI Challenge-Handshake Authentication Protocol(CHAP), before authentication takes place. Thus an attacker, who can either inject himself in the communication between edk2 and the iSCSI target or control the iSCSI target used by edk2, can trigger this flaw and potentially execute code in the edk2 firmware. Upstream bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=3356">https://bugzilla.tianocore.org/show_bug.cgi?id=3356</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1956284 is considered high due to the potential for buffer overflow vulnerabilities.
To fix REDHAT-BUG-1956284, you should update to a patched version of TianoCore EDK II that addresses the vulnerability.
REDHAT-BUG-1956284 is a buffer overflow vulnerability that arises from improper size checking in the IScsiHexToBin function.
Users of the TianoCore EDK II software are affected by REDHAT-BUG-1956284 if they utilize the IScsiHexToBin function.
Yes, an attacker who can control the input buffer may exploit REDHAT-BUG-1956284 remotely to cause a buffer overflow.