CVE-2023-40547

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

16 Sep 2024, 19:16

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/01/26/1', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html', 'source': 'secalert@redhat.com'}

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html -

30 Apr 2024, 12:15

Type Values Removed Values Added
CWE CWE-125

29 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2086 -

25 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1902 -
  • () https://access.redhat.com/errata/RHSA-2024:1903 -
  • () https://access.redhat.com/errata/RHSA-2024:1959 -

18 Apr 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1873 -
  • () https://access.redhat.com/errata/RHSA-2024:1876 -
  • () https://access.redhat.com/errata/RHSA-2024:1883 -

16 Apr 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1834 -
  • () https://access.redhat.com/errata/RHSA-2024:1835 -

26 Mar 2024, 16:15

Type Values Removed Values Added
CWE CWE-125

08 Feb 2024, 19:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.3

08 Feb 2024, 17:15

Type Values Removed Values Added
CWE CWE-346

07 Feb 2024, 17:15

Type Values Removed Values Added
Summary (en) A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. (en) A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

26 Jan 2024, 21:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/26/1 -

25 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 16:15

Updated : 2024-09-16 19:16


NVD link : CVE-2023-40547

Mitre link : CVE-2023-40547

CVE.ORG link : CVE-2023-40547


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • shim
CWE
CWE-787

Out-of-bounds Write

CWE-346

Origin Validation Error