{
  "threat_severity" : "Important",
  "public_date" : "2024-01-16T00:00:00Z",
  "bugzilla" : {
    "description" : "edk2: Buffer overflow in the DHCPv6 client via a long Server ID option",
    "id" : "2258685",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2258685"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-119",
  "details" : [ "EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This\nvulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Confidentiality, Integrity and/or Availability.", "A security flaw was identified in EDK2, the open-source reference implementation of the UEFI specification, involving a buffer overflow vulnerability. This particular weakness enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted DHCPv6 message. This, in turn, could result in an information disclosure and compromise the availability of the system." ],
  "statement" : "The buffer overflow vulnerability identified in EDK2 is of significant importance due to its potential impact on system security. As the open-source reference implementation of the UEFI specification, EDK2 plays a crucial role in system boot processes. The discovered flaw allows an unauthorized attacker within the local network to exploit the vulnerability by sending a specially crafted DHCPv6 message, leading to an information leak and compromising system availability. Given the fundamental role of UEFI in system functionality, addressing and patching this issue promptly is crucial to prevent potential security breaches and ensure the integrity of the overall system.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-03-04T00:00:00Z",
    "advisory" : "RHSA-2024:1063",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "edk2-0:20220126gitbb1bba3d77-6.el8_9.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2024-02-27T00:00:00Z",
    "advisory" : "RHSA-2024:1004",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "edk2-0:20190829git37eef91017ad-9.el8_2.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Telecommunications Update Service",
    "release_date" : "2024-02-27T00:00:00Z",
    "advisory" : "RHSA-2024:1004",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.2",
    "package" : "edk2-0:20190829git37eef91017ad-9.el8_2.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions",
    "release_date" : "2024-02-27T00:00:00Z",
    "advisory" : "RHSA-2024:1004",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.2",
    "package" : "edk2-0:20190829git37eef91017ad-9.el8_2.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2024-02-28T00:00:00Z",
    "advisory" : "RHSA-2024:1013",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
    "release_date" : "2024-02-28T00:00:00Z",
    "advisory" : "RHSA-2024:1013",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
    "release_date" : "2024-02-28T00:00:00Z",
    "advisory" : "RHSA-2024:1013",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2024-05-30T00:00:00Z",
    "advisory" : "RHSA-2024:3497",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "edk2-0:20220126gitbb1bba3d77-2.el8_6.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-03-19T00:00:00Z",
    "advisory" : "RHSA-2024:1415",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "edk2-0:20220126gitbb1bba3d77-4.el8_8.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-03-05T00:00:00Z",
    "advisory" : "RHSA-2024:1075",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "edk2-0:20230524-4.el9_3.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support",
    "release_date" : "2024-03-05T00:00:00Z",
    "advisory" : "RHSA-2024:1077",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.0",
    "package" : "edk2-0:20220126gitbb1bba3d77-3.el9_0.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-03-05T00:00:00Z",
    "advisory" : "RHSA-2024:1076",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "edk2-0:20221207gitfff6d81270b5-9.el9_2.2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-45230\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-45230\nhttps://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html\nhttps://github.com/advisories/GHSA-fc9w-pqjw-8r96" ],
  "name" : "CVE-2023-45230",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}