cvelist/2023/45xxx/CVE-2023-45232.json

118 lines
4.1 KiB
JSON
Raw Normal View History

2023-10-05 21:00:35 +00:00
{
2024-01-16 17:00:40 +00:00
"data_version": "4.0",
2023-10-05 21:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-45232",
2024-01-16 17:00:40 +00:00
"ASSIGNER": "infosec@edk2.groups.io",
"STATE": "PUBLIC"
2023-10-05 21:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-16 17:00:40 +00:00
"value": " EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This\n vulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Availability.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')",
"cweId": "CWE-835"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "TianoCore",
"product": {
"product_data": [
{
"product_name": "edk2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "edk2-stable202308"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h",
"refsource": "MISC",
"name": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h"
2024-01-16 19:00:40 +00:00
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/16/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/01/16/2"
2024-01-17 16:00:36 +00:00
},
{
"url": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html"
2024-03-07 18:00:34 +00:00
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0011/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20240307-0011/"
2024-04-01 20:43:44 +00:00
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/"
2024-01-16 17:00:40 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Quarkslab Vulnerability Reports Team"
},
{
"lang": "en",
"value": "Doug Flick"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
2023-10-05 21:00:35 +00:00
}
]
}
}