Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45230

Опубликовано: 16 янв. 2024
Источник: redhat
CVSS3: 8.8

Описание

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

A security flaw was identified in EDK2, the open-source reference implementation of the UEFI specification, involving a buffer overflow vulnerability. This particular weakness enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted DHCPv6 message. This, in turn, could result in an information disclosure and compromise the availability of the system.

Отчет

The buffer overflow vulnerability identified in EDK2 is of significant importance due to its potential impact on system security. As the open-source reference implementation of the UEFI specification, EDK2 plays a crucial role in system boot processes. The discovered flaw allows an unauthorized attacker within the local network to exploit the vulnerability by sending a specially crafted DHCPv6 message, leading to an information leak and compromising system availability. Given the fundamental role of UEFI in system functionality, addressing and patching this issue promptly is crucial to prevent potential security breaches and ensure the integrity of the overall system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2258685edk2: Buffer overflow in the DHCPv6 client via a long Server ID option

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.3
nvd
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.8
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.3
debian
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerabili ...

CVSS3: 8.3
github
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

8.8 High

CVSS3