Vulnerability CVE-2023-40547: Information

Description

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

Severity: HIGH (8.3) Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Published: Jan. 25, 2024
Modified: April 30, 2024
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
shimsisyphus15.8-alt115.8-alt2ALT-PU-2024-1671-2339548Fixed
shimp1015.8-alt115.8-alt1ALT-PU-2024-1877-3339915Fixed
shimc10f115.8-alt115.8-alt1ALT-PU-2024-4050-2342790Fixed
shimc9f215.8-alt115.8-alt1ALT-PU-2024-1869-3339892Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*
      End excliding
      15.8

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*