openEuler 22.03 LTS SP1 update for edk2



Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3712
CVE-2022-0778
CWE-ID CWE-125
CWE-835
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-edk2-devel
Operating systems & Components / Operating system package or component

edk2-ovmf
Operating systems & Components / Operating system package or component

edk2-help
Operating systems & Components / Operating system package or component

edk2-aarch64
Operating systems & Components / Operating system package or component

edk2-devel
Operating systems & Components / Operating system package or component

edk2-debugsource
Operating systems & Components / Operating system package or component

edk2-debuginfo
Operating systems & Components / Operating system package or component

edk2
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU56064

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-3712

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing ASN.1 strings related to a confusion with NULL termination of strings in array. A remote attacker can pass specially crafted data to the application to trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-edk2-devel: before 202011-20

edk2-ovmf: before 202011-20

edk2-help: before 202011-20

edk2-aarch64: before 202011-20

edk2-devel: before 202011-20

edk2-debugsource: before 202011-20

edk2-debuginfo: before 202011-20

edk2: before 202011-20

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2095


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Infinite loop

EUVDB-ID: #VU61391

Risk: Medium

CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2022-0778

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the BN_mod_sqrt() function when processing an ASN.1 certificate that contains elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. A remote attacker can supply a specially crafted certificate to the TLS server or client, consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP1

python3-edk2-devel: before 202011-20

edk2-ovmf: before 202011-20

edk2-help: before 202011-20

edk2-aarch64: before 202011-20

edk2-devel: before 202011-20

edk2-debugsource: before 202011-20

edk2-debuginfo: before 202011-20

edk2: before 202011-20

CPE2.3 External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2095


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###