First published: Tue Jan 16 2024(Updated: )
EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
Credit: infosec@edk2.groups.io infosec@edk2.groups.io
Affected Software | Affected Version | How to fix |
---|---|---|
debian/edk2 | <=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6 | 2022.11-6+deb12u1 2024.02-2 |
ubuntu/edk2 | <0~20191122. | 0~20191122. |
ubuntu/edk2 | <2022.02-3ubuntu0.22.04.2 | 2022.02-3ubuntu0.22.04.2 |
ubuntu/edk2 | <2023.05-2ubuntu0.1 | 2023.05-2ubuntu0.1 |
Tianocore EDK II | <=202311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45232 has a high severity rating due to its potential to cause a denial of service attack by exploiting an infinite loop in the code.
To fix CVE-2023-45232, upgrade to the recommended versions of edk2 as specified in the affected software list.
CVE-2023-45232 affects various versions of the Tianocore EDK2 and corresponding packages in Ubuntu and Debian distributions.
Yes, CVE-2023-45232 can potentially be exploited by attackers to gain unauthorized access due to the infinite loop vulnerability.
There are no specific workarounds for CVE-2023-45232; applying the security update is essential to mitigate the vulnerability.