CVE-2023-45234

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:26

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List
References () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/ -
References () https://security.netapp.com/advisory/ntap-20240307-0011/ - () https://security.netapp.com/advisory/ntap-20240307-0011/ -
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.3

13 Mar 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/ -

07 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240307-0011/ -

23 Jan 2024, 15:58

Type Values Removed Values Added
First Time Tianocore
Tianocore edk2
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-119
CPE cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/01/16/2 - () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List
References () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - Third Party Advisory, VDB Entry
References () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory

17 Jan 2024, 15:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html -

16 Jan 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/16/2 -

16 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-11-21 08:26


NVD link : CVE-2023-45234

Mitre link : CVE-2023-45234

CVE.ORG link : CVE-2023-45234


JSON object : View

Products Affected

tianocore

  • edk2
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer