First published: Tue Jan 16 2024(Updated: )
EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Credit: infosec@edk2.groups.io infosec@edk2.groups.io
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II | ||
ubuntu/edk2 | <0~20191122. | 0~20191122. |
ubuntu/edk2 | <2022.02-3ubuntu0.22.04.2 | 2022.02-3ubuntu0.22.04.2 |
ubuntu/edk2 | <2023.05-2ubuntu0.1 | 2023.05-2ubuntu0.1 |
Tianocore EDK2 | <=202311 | |
debian/edk2 | <=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6 | 2022.11-6+deb12u1 2024.02-2 |
<=202311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45230 has a high severity as it can lead to unauthorized access and potential loss of confidentiality, integrity, and availability.
To fix CVE-2023-45230, update EDK II to a version greater than 202311, or apply the appropriate patches if using compatible distributions such as Ubuntu or Debian.
CVE-2023-45230 affects Tianocore EDK II and various versions across Ubuntu and Debian packages.
An attacker can exploit CVE-2023-45230 by sending a long server ID option in DHCPv6, leading to a buffer overflow.
A potential workaround for CVE-2023-45230 is to disable DHCPv6 on affected systems until an update can be applied.