Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45235

Опубликовано: 16 янв. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

A security flaw involving buffer overflow was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity network to transmit a specifically crafted DHCPv6 proxy Advertise message, resulting in the disclosure of information and potential compromise of system availability.

Отчет

The discovery of a buffer overflow vulnerability in EDK2, the open-source implementation of the UEFI specification, raises significant concerns for system security. This flaw, when exploited by an unauthorized attacker on the same network, allows for the transmission of a malicious DHCPv6 proxy Advertise message. This can lead to the compromise of sensitive information and poses a serious threat to the availability of the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2258700edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message

EPSS

Процентиль: 54%
0.00314
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.3
nvd
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

CVSS3: 8.8
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.3
debian
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerabili ...

CVSS3: 8.3
github
больше 1 года назад

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

EPSS

Процентиль: 54%
0.00314
Низкий

8.8 High

CVSS3