Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-45236

Опубликовано: 16 янв. 2024
Источник: debian

Описание

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
edk2fixed2024.05-1package
edk2no-dsabookwormpackage
edk2postponedbullseyepackage
edk2no-dsabusterpackage

Примечания

  • https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html

  • https://www.openwall.com/lists/oss-security/2024/01/16/2

  • https://github.com/tianocore/edk2/commit/1904a64bcc18199738e5be183d28887ac5d837d7 (edk2-stable202405)

Связанные уязвимости

CVSS3: 5.8
ubuntu
больше 1 года назад

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

CVSS3: 7.5
redhat
больше 1 года назад

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

CVSS3: 5.8
nvd
больше 1 года назад

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

CVSS3: 7.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 5.8
github
больше 1 года назад

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.