Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45234

Опубликовано: 16 янв. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

A security weakness was identified in EDK2, the open-source reference implementation of the UEFI specification, revealing a buffer overflow vulnerability. This vulnerability enables an unauthorized attacker within proximity on the network to transmit a specifically crafted DHCPv6 Advertise message. As a consequence, it results in the unauthorized disclosure of information and jeopardizes the availability of the system.

Отчет

The discovery of a buffer overflow vulnerability in EDK2, the open-source UEFI implementation, is a significant issue due to its potential impact on system security. This flaw allows an attacker to exploit the system's vulnerability through a specially crafted DHCPv6 Advertise message, leading to unauthorized access, information leakage, and potential compromise of system availability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2258697edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message

EPSS

Процентиль: 53%
0.00307
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.3
nvd
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.8
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.3
debian
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerabili ...

CVSS3: 8.3
github
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

EPSS

Процентиль: 53%
0.00307
Низкий

8.8 High

CVSS3