{
  "threat_severity" : "Important",
  "public_date" : "2024-01-16T00:00:00Z",
  "bugzilla" : {
    "description" : "edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message",
    "id" : "2258700",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2258700"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-119",
  "details" : [ "EDK2's Network Package is susceptible to a buffer overflow vulnerability when\nhandling Server ID option \nfrom a DHCPv6 proxy Advertise message. This\nvulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Confidentiality, Integrity and/or Availability.", "A security flaw involving buffer overflow was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity network to transmit a specifically crafted DHCPv6 proxy Advertise message, resulting in the disclosure of information and potential compromise of system availability." ],
  "statement" : "The discovery of a buffer overflow vulnerability in EDK2, the open-source implementation of the UEFI specification, raises significant concerns for system security. This flaw, when exploited by an unauthorized attacker on the same network, allows for the transmission of a malicious DHCPv6 proxy Advertise message. This can lead to the compromise of sensitive information and poses a serious threat to the availability of the system.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3017",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "edk2-0:20220126gitbb1bba3d77-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2024-09-19T00:00:00Z",
    "advisory" : "RHSA-2024:6849",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "edk2-0:20190829git37eef91017ad-9.el8_2.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8449",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8449",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8449",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.4",
    "package" : "edk2-0:20200602gitca407c7246bf-4.el8_4.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8455",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "edk2-0:20220126gitbb1bba3d77-2.el8_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8455",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "edk2-0:20220126gitbb1bba3d77-2.el8_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2024-10-24T00:00:00Z",
    "advisory" : "RHSA-2024:8455",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "edk2-0:20220126gitbb1bba3d77-2.el8_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-09-19T00:00:00Z",
    "advisory" : "RHSA-2024:6845",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "edk2-0:20220126gitbb1bba3d77-4.el8_8.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2264",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "edk2-0:20231122-6.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2024-09-23T00:00:00Z",
    "advisory" : "RHSA-2024:6931",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "edk2-0:20220126gitbb1bba3d77-3.el9_0.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-07-09T00:00:00Z",
    "advisory" : "RHSA-2024:4419",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "edk2-0:20221207gitfff6d81270b5-9.el9_2.3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-45235\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-45235\nhttps://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html\nhttps://github.com/advisories/GHSA-h9v6-q439-p7j2" ],
  "name" : "CVE-2023-45235",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}