CVE-2023-40547
Published: January 25, 2024Last modified: January 25, 2024
Description
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.3 |
| Attack Vector | ADJACENT_NETWORK |
| Attack complexity | HIGH |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | CHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | shim | Fixed (15.8-r0) |
| shim-signed | Vulnerable (15.7-r0) | ||
| Stream | shim | Fixed (15.8-r0) | |
| shim-signed | Vulnerable (15.7-r0) |
References
- http://www.openwall.com/lists/oss-security/2024/01/26/1
- https://access.redhat.com/errata/RHSA-2024:1834
- https://access.redhat.com/errata/RHSA-2024:1835
- https://access.redhat.com/errata/RHSA-2024:1873
- https://access.redhat.com/errata/RHSA-2024:1876
- https://access.redhat.com/errata/RHSA-2024:1883
- https://access.redhat.com/errata/RHSA-2024:1902
- https://access.redhat.com/errata/RHSA-2024:1903
- https://access.redhat.com/errata/RHSA-2024:1959
- https://access.redhat.com/errata/RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40547
- https://bugzilla.redhat.com/show_bug.cgi?id=2234589
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html