CVE-2023-45232

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*

History

13 Mar 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/ -

07 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240307-0011/ -

23 Jan 2024, 19:39

Type Values Removed Values Added
CWE CWE-835
CPE cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - () http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2024/01/16/2 - () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List
References () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory

17 Jan 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-03-13 02:15


NVD link : CVE-2023-45232

Mitre link : CVE-2023-45232

CVE.ORG link : CVE-2023-45232


JSON object : View

Products Affected

tianocore

  • edk2
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')