Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-5088-1 (CVE-2021-38575): EDK II vulnerabilities

Back to Search

Ubuntu: USN-5088-1 (CVE-2021-38575): EDK II vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/23/2021
Created
09/28/2021
Added
09/24/2021
Modified
09/24/2021

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From USN-5088-1:

It was discovered that EDK II incorrectly handled input validation in MdeModulePkg. A local user could possibly use this issue to cause EDK II to crash, resulting in a denial of service, obtain sensitive information or execute arbitrary code. (CVE-2019-11098)

Paul Kehrer discovered that OpenSSL used in EDK II incorrectly handled certain input lengths in EVP functions. An attacker could possibly use this issue to cause EDK II to crash, resulting in a denial of service. (CVE-2021-23840)

Ingo Schwarze discovered that OpenSSL used in EDK II incorrectly handled certain ASN.1 strings. An attacker could use this issue to cause EDK II to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2021-3712)

It was discovered that EDK II incorrectly decoded certain strings. A remote attacker could use this issue to cause EDK II to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-38575)

Solution(s)

  • ubuntu-upgrade-ovmf
  • ubuntu-upgrade-ovmf-ia32
  • ubuntu-upgrade-qemu-efi
  • ubuntu-upgrade-qemu-efi-aarch64
  • ubuntu-upgrade-qemu-efi-arm

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;