wid-sec-w-2024-0126
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2024-07-24 22:00
Summary
EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen

Notes

Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
InsydeH2O UEFI BIOS ist eine proprietäre, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterstützt.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der EDK2 NetworkPkg IP stack implementation ausnutzen, um beliebigen Programmcode auszuführen, vertrauliche Informationen offenzulegen und einen Denial of Service Zustand auszulösen.
Betroffene Betriebssysteme
- BIOS/Firmware



{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "InsydeH2O UEFI BIOS ist eine propriet\u00e4re, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterst\u00fctzt.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der EDK2 NetworkPkg IP stack implementation ausnutzen, um beliebigen Programmcode auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen Denial of Service Zustand auszul\u00f6sen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0126 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0126.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0126 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0126"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1077 vom 2024-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2024:1077"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1075 vom 2024-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2024:1075"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1076 vom 2024-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2024:1076"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2483 vom 2024-03-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2483.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1075 vom 2024-03-08",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1075.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1004 vom 2024-02-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1004"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-A9DEAD34C5 vom 2024-02-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-a9dead34c5"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1305 vom 2024-03-13",
        "url": "https://access.redhat.com/errata/RHSA-2024:1305"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1013 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2024:1013"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-150692 vom 2024-02-14",
        "url": "https://support.lenovo.com/us/en/product_security/LEN-150692"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5624 vom 2024-02-14",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00031.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6638-1 vom 2024-02-15",
        "url": "https://ubuntu.com/security/notices/USN-6638-1"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2023-384 vom 2024-01-31",
        "url": "https://www.dell.com/support/kbdoc/000218418/dsa-2023-="
      },
      {
        "category": "external",
        "summary": "Quarkslab-Blog vom 2024-01-16",
        "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html"
      },
      {
        "category": "external",
        "summary": "Insyde Security Advisory 2023066 vom 2024-01-16",
        "url": "https://www.insyde.com/security-pledge/SA-2023066"
      },
      {
        "category": "external",
        "summary": "Titancore GitHub vom 2024-01-16",
        "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1063 vom 2024-03-06",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1063.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:1063 vom 2024-03-12",
        "url": "https://errata.build.resf.org/RLSA-2024:1063"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-080 vom 2024-02-21",
        "url": "https://www.dell.com/support/kbdoc/000222073/dsa-2024-="
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1063 vom 2024-03-04",
        "url": "https://access.redhat.com/errata/RHSA-2024:1063"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1415 vom 2024-03-19",
        "url": "https://access.redhat.com/errata/RHSA-2024:1415"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF04593 rev.1 vom 2024-04-03",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbhf04593en_us"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1722 vom 2024-04-09",
        "url": "https://access.redhat.com/errata/RHSA-2024:1722"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2023-344 vom 2024-04-18",
        "url": "https://www.dell.com/support/kbdoc/000217986/dsa-2023-="
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-20865 vom 2024-04-25",
        "url": "https://linux.oracle.com/errata/ELSA-2024-20865.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12343 vom 2024-04-25",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12343.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2264 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2264"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3017 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3017"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3497 vom 2024-05-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:3497"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12409 vom 2024-06-04",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12409.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-23120 vom 2024-06-04",
        "url": "https://linux.oracle.com/errata/ELSA-2024-23120.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4419 vom 2024-07-09",
        "url": "https://access.redhat.com/errata/RHSA-2024:4419"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4749 vom 2024-07-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:4749"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-4749 vom 2024-07-25",
        "url": "https://linux.oracle.com/errata/ELSA-2024-4749.html"
      }
    ],
    "source_lang": "en-US",
    "title": "EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-07-24T22:00:00.000+00:00",
      "generator": {
        "date": "2024-07-25T08:36:29.251+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.0"
        }
      },
      "id": "WID-SEC-W-2024-0126",
      "initial_release_date": "2024-01-16T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-01-16T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-01-30T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-02-14T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von LENOVO, Debian und Ubuntu aufgenommen"
        },
        {
          "date": "2024-02-20T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-02-26T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-02-27T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-03-03T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-03-04T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat und Amazon aufgenommen"
        },
        {
          "date": "2024-03-06T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-10T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-12T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2024-03-19T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-03T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2024-04-09T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-17T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-04-24T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-04T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-07-09T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-23T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-24T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        }
      ],
      "status": "final",
      "version": "23"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Dell BIOS",
                "product": {
                  "name": "Dell BIOS",
                  "product_id": "T029364",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:bios:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell BIOS",
                "product": {
                  "name": "Dell BIOS",
                  "product_id": "T033534",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:bios:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "BIOS"
          },
          {
            "category": "product_name",
            "name": "Dell Computer",
            "product": {
              "name": "Dell Computer",
              "product_id": "T006498",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:dell_computer:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "T30 \u003c1.14.0",
                "product": {
                  "name": "Dell PowerEdge T30 \u003c1.14.0",
                  "product_id": "T032970",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:poweredge:t30__1.14.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "T40 \u003c1.15.0",
                "product": {
                  "name": "Dell PowerEdge T40 \u003c1.15.0",
                  "product_id": "T032971",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:poweredge:t40__1.15.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerEdge"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE ProLiant",
            "product": {
              "name": "HPE ProLiant",
              "product_id": "T027712",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:proliant:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "HPE Synergy",
            "product": {
              "name": "HPE Synergy",
              "product_id": "T019820",
              "product_identification_helper": {
                "cpe": "cpe:/h:hpe:synergy:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Kernel \u003c05.28.49",
                "product": {
                  "name": "Insyde UEFI Firmware Kernel \u003c05.28.49",
                  "product_id": "T032206",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:insyde:uefi:kernel__05.28.49"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Kernel \u003c05.37.49",
                "product": {
                  "name": "Insyde UEFI Firmware Kernel \u003c05.37.49",
                  "product_id": "T032207",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:insyde:uefi:kernel__05.37.49"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Kernel \u003c05.45.49",
                "product": {
                  "name": "Insyde UEFI Firmware Kernel \u003c05.45.49",
                  "product_id": "T032208",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:insyde:uefi:kernel__05.45.49"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Kernel \u003c05.53.49",
                "product": {
                  "name": "Insyde UEFI Firmware Kernel \u003c05.53.49",
                  "product_id": "T032209",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:insyde:uefi:kernel__05.53.49"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Kernel \u003c05.60.49",
                "product": {
                  "name": "Insyde UEFI Firmware Kernel \u003c05.60.49",
                  "product_id": "T032210",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:insyde:uefi:kernel__05.60.49"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "UEFI Firmware"
          }
        ],
        "category": "vendor",
        "name": "Insyde"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Lenovo Computer",
            "product": {
              "name": "Lenovo Computer",
              "product_id": "T030470",
              "product_identification_helper": {
                "cpe": "cpe:/h:lenovo:computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-45229",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45229"
    },
    {
      "cve": "CVE-2023-45230",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45230"
    },
    {
      "cve": "CVE-2023-45231",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45231"
    },
    {
      "cve": "CVE-2023-45232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45232"
    },
    {
      "cve": "CVE-2023-45233",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45233"
    },
    {
      "cve": "CVE-2023-45234",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45234"
    },
    {
      "cve": "CVE-2023-45235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45235"
    },
    {
      "cve": "CVE-2023-45236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45236"
    },
    {
      "cve": "CVE-2023-45237",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in der EDK2 NetworkPkg IP Stack Implementierung. Die Fehler bestehen aufgrund von mehreren Out-of-bounds-Reads, mehreren Puffer\u00fcberl\u00e4ufen, Endlosschleifen, vorhersehbaren TCP ISNs und der Verwendung eines schwachen PseudoRandom NumberGenerators. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und einen \u0027Denial of Service\u0027-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T006498",
          "T033534",
          "T029364",
          "T032971",
          "67646",
          "T004914",
          "T030470",
          "T032255",
          "T032970",
          "74185",
          "T019820",
          "2951",
          "T000126",
          "T027712",
          "398363"
        ]
      },
      "release_date": "2024-01-16T23:00:00Z",
      "title": "CVE-2023-45237"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.