CVE-2023-40547

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

25 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1902 -
  • () https://access.redhat.com/errata/RHSA-2024:1903 -
  • () https://access.redhat.com/errata/RHSA-2024:1959 -

18 Apr 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1873 -
  • () https://access.redhat.com/errata/RHSA-2024:1876 -
  • () https://access.redhat.com/errata/RHSA-2024:1883 -

16 Apr 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1834 -
  • () https://access.redhat.com/errata/RHSA-2024:1835 -

26 Mar 2024, 16:15

Type Values Removed Values Added
CWE CWE-125

08 Feb 2024, 19:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.3

08 Feb 2024, 17:15

Type Values Removed Values Added
CWE CWE-346

07 Feb 2024, 17:15

Type Values Removed Values Added
Summary (en) A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. (en) A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

02 Feb 2024, 16:53

Type Values Removed Values Added
CWE CWE-787
References () http://www.openwall.com/lists/oss-security/2024/01/26/1 - () http://www.openwall.com/lists/oss-security/2024/01/26/1 - Mailing List, Patch, Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-40547 - () https://access.redhat.com/security/cve/CVE-2023-40547 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2234589 - () https://bugzilla.redhat.com/show_bug.cgi?id=2234589 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux
Redhat shim
Redhat
CVSS v2 : unknown
v3 : 8.3
v2 : unknown
v3 : 9.8

26 Jan 2024, 21:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad de ejecución remota de código en Shim. El soporte de arranque Shim confía en los valores controlados por el atacante al analizar una respuesta HTTP. Este fallo permite a un atacante manipular una solicitud HTTP maliciosa específica, lo que lleva a una escritura fuera de los límites completamente controlada primitiva y a un compromiso completo del sistema.
References
  • () http://www.openwall.com/lists/oss-security/2024/01/26/1 -

25 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 16:15

Updated : 2024-04-25 14:15


NVD link : CVE-2023-40547

Mitre link : CVE-2023-40547

CVE.ORG link : CVE-2023-40547


JSON object : View

Products Affected

redhat

  • shim
  • enterprise_linux
CWE
CWE-125

Out-of-bounds Read

CWE-346

Origin Validation Error

CWE-787

Out-of-bounds Write