CVE-2023-40547
Published: January 25, 2024Last modified: January 25, 2024
Description
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.3 |
Attack Vector | ADJACENT_NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | CHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | shim | Fixed (15.8-r0) |
shim-signed | Vulnerable (15.7-r0) | ||
Stream | shim | Fixed (15.8-r0) | |
shim-signed | Vulnerable (15.7-r0) |
References
- http://www.openwall.com/lists/oss-security/2024/01/26/1
- https://access.redhat.com/errata/RHSA-2024:1834
- https://access.redhat.com/errata/RHSA-2024:1835
- https://access.redhat.com/errata/RHSA-2024:1873
- https://access.redhat.com/errata/RHSA-2024:1876
- https://access.redhat.com/errata/RHSA-2024:1883
- https://access.redhat.com/errata/RHSA-2024:1902
- https://access.redhat.com/errata/RHSA-2024:1903
- https://access.redhat.com/errata/RHSA-2024:1959
- https://access.redhat.com/errata/RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40547
- https://bugzilla.redhat.com/show_bug.cgi?id=2234589
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html