Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45230
HistoryJan 16, 2024 - 12:00 a.m.

CVE-2023-45230

2024-01-1600:00:00
ubuntu.com
ubuntu.com
16
edk2 network package
buffer overflow
dhcpv6 client
unauthorized access
confidentiality
integrity
availability

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

20.1%

EDK2’s Network Package is susceptible to a buffer overflow vulnerability
via a long server ID option in DHCPv6 client. This vulnerability can be
exploited by an attacker to gain unauthorized access and potentially lead
to a loss of Confidentiality, Integrity and/or Availability.

Bugs

Notes

Author Note
eslerm “exposure is limited to PXE boot or HTTP boot” patchset available in bug 4518, but not in repo (until Feb-24) fix and unit test commit id likely 0cf3620092c and 1bd40aba86e
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchedk2< anyUNKNOWN
ubuntu20.04noarchedk2< 0~20191122.bd85bf54-2ubuntu3.5UNKNOWN
ubuntu22.04noarchedk2< 2022.02-3ubuntu0.22.04.2UNKNOWN
ubuntu23.10noarchedk2< 2023.05-2ubuntu0.1UNKNOWN
ubuntu16.04noarchedk2< anyUNKNOWN

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

20.1%