CVE-2023-45234

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45234
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45234.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45234
Aliases
Related
Published
2024-01-16T16:15:12Z
Modified
2024-08-01T05:26:52.289317Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

References

Affected packages

Git / github.com/tianocore/edk2

Affected ranges

Type
GIT
Repo
https://github.com/tianocore/edk2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

edk2-stable201808
edk2-stable201811
edk2-stable201903
edk2-stable201905
edk2-stable201908
edk2-stable201911
edk2-stable202002
edk2-stable202005
edk2-stable202008
edk2-stable202011
edk2-stable202102
edk2-stable202105
edk2-stable202108
edk2-stable202108-rc0
edk2-stable202108-rc1
edk2-stable202111
edk2-stable202111-rc1
edk2-stable202202
edk2-stable202202-rc1
edk2-stable202205
edk2-stable202205-rc1
edk2-stable202208
edk2-stable202211
edk2-stable202302
edk2-stable202305
edk2-stable202308
edk2-stable202311