Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45230
HistoryJan 16, 2024 - 12:00 a.m.

CVE-2023-45230

2024-01-1600:00:00
ubuntu.com
ubuntu.com
13
edk2 network package
buffer overflow
dhcpv6 client
unauthorized access
confidentiality
integrity
availability

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.1%

EDK2’s Network Package is susceptible to a buffer overflow vulnerability
via a long server ID option in DHCPv6 client. This vulnerability can be
exploited by an attacker to gain unauthorized access and potentially lead
to a loss of Confidentiality, Integrity and/or Availability.

Bugs

Notes

Author Note
eslerm “exposure is limited to PXE boot or HTTP boot” patchset available in bug 4518, but not in repo (until Feb-24) fix and unit test commit id likely 0cf3620092c and 1bd40aba86e
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchedk2< anyUNKNOWN
ubuntu20.04noarchedk2< 0~20191122.bd85bf54-2ubuntu3.5UNKNOWN
ubuntu22.04noarchedk2< 2022.02-3ubuntu0.22.04.2UNKNOWN
ubuntu23.10noarchedk2< 2023.05-2ubuntu0.1UNKNOWN
ubuntu16.04noarchedk2< anyUNKNOWN

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.1%