Lucene search

K
ubuntuUbuntuUSN-4349-1
HistoryApr 30, 2020 - 12:00 a.m.

EDK II vulnerabilities

2020-04-3000:00:00
ubuntu.com
38

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.5 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.5%

Releases

  • Ubuntu 19.10
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • edk2 - UEFI firmware for 64-bit x86 virtual machines

Details

A buffer overflow was discovered in the network stack. An unprivileged user
could potentially enable escalation of privilege and/or denial of service.
This issue was already fixed in a previous release for 18.04 LTS and 19.10.
(CVE-2018-12178)

A buffer overflow was discovered in BlockIo service. An unauthenticated user
could potentially enable escalation of privilege, information disclosure and/or
denial of service. This issue was already fixed in a previous release for 18.04
LTS and 19.10. (CVE-2018-12180)

A stack overflow was discovered in bmp. An unprivileged user
could potentially enable denial of service or elevation of privilege via
local access. This issue was already fixed in a previous release for 18.04
LTS and 19.10. (CVE-2018-12181)

It was discovered that memory was not cleared before free that could lead
to potential password leak. (CVE-2019-14558)

A memory leak was discovered in ArpOnFrameRcvdDpc. An attacker could
possibly use this issue to cause a denial of service or other unspecified
impact. (CVE-2019-14559)

An integer overflow was discovered in MdeModulePkg/PiDxeS3BootScriptLib.
An attacker could possibly use this issue to cause a denial of service or
other unspecified impact. (CVE-2019-14563)

It was discovered that the affected version doesnโ€™t properly check whether an
unsigned EFI file should be allowed or not. An attacker could possibly load
unsafe content by bypassing the verification. (CVE-2019-14575)

It was discovered that original configuration runtime memory is freed, but it
is still exposed to the OS runtime. (CVE-2019-14586)

A double-unmap was discovered in TRB creation. An attacker could use it to
cause a denial of service or other unspecified impact. (CVE-2019-14587)

OSVersionArchitecturePackageVersionFilename
Ubuntu19.10noarchovmf<ย 0~20190606.20d2e5a1-2ubuntu1.1UNKNOWN
Ubuntu19.10noarchqemu-efi<ย 0~20190606.20d2e5a1-2ubuntu1.1UNKNOWN
Ubuntu19.10noarchqemu-efi-aarch64<ย 0~20190606.20d2e5a1-2ubuntu1.1UNKNOWN
Ubuntu19.10noarchqemu-efi-arm<ย 0~20190606.20d2e5a1-2ubuntu1.1UNKNOWN
Ubuntu18.04noarchovmf<ย 0~20180205.c0d9813c-2ubuntu0.2UNKNOWN
Ubuntu18.04noarchqemu-efi<ย 0~20180205.c0d9813c-2ubuntu0.2UNKNOWN
Ubuntu18.04noarchqemu-efi-aarch64<ย 0~20180205.c0d9813c-2ubuntu0.2UNKNOWN
Ubuntu18.04noarchqemu-efi-arm<ย 0~20180205.c0d9813c-2ubuntu0.2UNKNOWN
Ubuntu16.04noarchovmf<ย 0~20160408.ffea0a2c-2ubuntu0.1UNKNOWN
Ubuntu16.04noarchqemu-efi<ย 0~20160408.ffea0a2c-2ubuntu0.1UNKNOWN

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

8.5 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.5%