{"containers":{"cna":{"affected":[{"product":"Extensible Firmware Interface Development Kit (EDK II)","vendor":"Extensible Firmware Interface Development Kit (EDK II)","versions":[{"status":"affected","version":"N/A"}]}],"datePublic":"2019-03-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access."}],"problemTypes":[{"descriptions":[{"description":"Escalation of Privilege, Information Disclosure and/or Denial of Service","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-05-07T14:06:05.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html"},{"name":"openSUSE-SU-2019:1083","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"RHSA-2019:0809","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:0809"},{"name":"RHSA-2019:0968","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:0968"},{"name":"RHSA-2019:1116","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:1116"},{"name":"USN-4349-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4349-1/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2018-12180","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Extensible Firmware Interface Development Kit (EDK II)","version":{"version_data":[{"version_value":"N/A"}]}}]},"vendor_name":"Extensible Firmware Interface Development Kit (EDK II)"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege, Information Disclosure and/or Denial of Service"}]}]},"references":{"reference_data":[{"name":"https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html","refsource":"CONFIRM","url":"https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html"},{"name":"openSUSE-SU-2019:1083","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"RHSA-2019:0809","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:0809"},{"name":"RHSA-2019:0968","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:0968"},{"name":"RHSA-2019:1116","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:1116"},{"name":"USN-4349-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4349-1/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:30:58.414Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://edk2-docs.gitbooks.io/security-advisory/content/buffer-overflow-in-blockio-service-for-ram-disk.html"},{"name":"openSUSE-SU-2019:1083","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html"},{"name":"FEDORA-2019-bff1cbaba3","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ABTDKZK2G5XP6JCO3HXMPOA2NRTIYDZ/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us"},{"name":"RHSA-2019:0809","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:0809"},{"name":"RHSA-2019:0968","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:0968"},{"name":"RHSA-2019:1116","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1116"},{"name":"USN-4349-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4349-1/"}]}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2018-12180","datePublished":"2019-03-27T19:22:10.000Z","dateReserved":"2018-06-11T00:00:00.000Z","dateUpdated":"2024-08-05T08:30:58.414Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}