A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
References
Configurations
History
21 Nov 2024, 08:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://access.redhat.com/errata/RHSA-2024:1834 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1835 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1873 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1876 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1883 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1902 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1903 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:1959 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:2086 - | |
| References | () https://access.redhat.com/security/cve/CVE-2023-40547 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2234589 - Issue Tracking, Vendor Advisory |
16 Sep 2024, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jun 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Apr 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
29 Apr 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Apr 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Apr 2024, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Apr 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
26 Mar 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 |
08 Feb 2024, 19:25
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
08 Feb 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-346 |
07 Feb 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully. |
26 Jan 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jan 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-25 16:15
Updated : 2024-11-21 08:19
NVD link : CVE-2023-40547
Mitre link : CVE-2023-40547
CVE.ORG link : CVE-2023-40547
JSON object : View
Products Affected
redhat
- shim
- enterprise_linux
