Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45235
HistoryJan 16, 2024 - 12:00 a.m.

CVE-2023-45235

2024-01-1600:00:00
ubuntu.com
ubuntu.com
9
edk2
network package
buffer overflow
dhcpv6
advertise message
unauthorized access
confidentiality
integrity
availability

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.3%

EDK2’s Network Package is susceptible to a buffer overflow vulnerability
when handling Server ID option from a DHCPv6 proxy Advertise message. This
vulnerability can be exploited by an attacker to gain unauthorized access
and potentially lead to a loss of Confidentiality, Integrity and/or
Availability.

Bugs

Notes

Author Note
eslerm “exposure is limited to PXE boot or HTTP boot” patchset available in bug 4518, but not in repo (until Feb-24) fix and unit test commit id likely 4412e98d283 and bef5afa1c2c
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchedk2< anyUNKNOWN
ubuntu20.04noarchedk2< 0~20191122.bd85bf54-2ubuntu3.5UNKNOWN
ubuntu22.04noarchedk2< 2022.02-3ubuntu0.22.04.2UNKNOWN
ubuntu23.10noarchedk2< 2023.05-2ubuntu0.1UNKNOWN
ubuntu16.04noarchedk2< anyUNKNOWN

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.3%