CVE-2023-40547
Published: January 25, 2024Last modified: January 25, 2024
Description
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 8.3 | 
| Attack Vector | ADJACENT_NETWORK | 
| Attack complexity | HIGH | 
| Privileges required | NONE | 
| User interaction | NONE | 
| Scope | CHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | shim | Fixed (15.8-r0) | 
| shim-signed | Vulnerable (15.7-r0) | ||
| Stream | shim | Fixed (15.8-r0) | |
| shim-signed | Vulnerable (15.7-r0) | 
References
- http://www.openwall.com/lists/oss-security/2024/01/26/1
- https://access.redhat.com/errata/RHSA-2024:1834
- https://access.redhat.com/errata/RHSA-2024:1835
- https://access.redhat.com/errata/RHSA-2024:1873
- https://access.redhat.com/errata/RHSA-2024:1876
- https://access.redhat.com/errata/RHSA-2024:1883
- https://access.redhat.com/errata/RHSA-2024:1902
- https://access.redhat.com/errata/RHSA-2024:1903
- https://access.redhat.com/errata/RHSA-2024:1959
- https://access.redhat.com/errata/RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40547
- https://bugzilla.redhat.com/show_bug.cgi?id=2234589
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html