EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. | EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. |
Tue, 22 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:tianocore:edk2:-:*:*:*:*:*:*:* | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: TianoCore
Published:
Updated: 2025-02-13T17:13:53.699Z
Reserved: 2023-10-05T20:48:19.877Z
Link: CVE-2023-45230

Updated: 2024-08-02T20:14:19.957Z

Status : Modified
Published: 2024-01-16T16:15:11.727
Modified: 2025-02-13T18:15:29.630
Link: CVE-2023-45230
