{"containers":{"cna":{"affected":[{"product":"Extensible Firmware Interface Development Kit (EDK II)","vendor":"Extensible Firmware Interface Development Kit (EDK II)","versions":[{"status":"affected","version":"N/A"}]}],"datePublic":"2019-03-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network."}],"problemTypes":[{"descriptions":[{"description":"Escalation of Privilege and/or Denial of Service","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-05-07T14:06:06.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html"},{"name":"openSUSE-SU-2019:1083","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"USN-4349-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4349-1/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2018-12178","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Extensible Firmware Interface Development Kit (EDK II)","version":{"version_data":[{"version_value":"N/A"}]}}]},"vendor_name":"Extensible Firmware Interface Development Kit (EDK II)"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege and/or Denial of Service"}]}]},"references":{"reference_data":[{"name":"https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html","refsource":"CONFIRM","url":"https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html"},{"name":"openSUSE-SU-2019:1083","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"USN-4349-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4349-1/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:30:59.170Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://edk2-docs.gitbooks.io/security-advisory/content/dns-pack-size-check.html"},{"name":"openSUSE-SU-2019:1083","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"USN-4349-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4349-1/"}]}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2018-12178","datePublished":"2019-03-27T19:19:31.000Z","dateReserved":"2018-06-11T00:00:00.000Z","dateUpdated":"2024-08-05T08:30:59.170Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}