EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Availability.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. | EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. |
Wed, 16 Oct 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:8.8 | |
Vendors & Products |
Redhat rhel Eus
|

Status: PUBLISHED
Assigner: TianoCore
Published:
Updated: 2025-02-13T17:13:55.119Z
Reserved: 2023-10-05T20:48:19.878Z
Link: CVE-2023-45232

No data.

Status : Modified
Published: 2024-01-16T16:15:12.090
Modified: 2025-02-13T18:15:29.863
Link: CVE-2023-45232
