CVE-2023-40547

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-25 16:15

Updated : 2024-06-10 18:15


NVD link : CVE-2023-40547

Mitre link : CVE-2023-40547

CVE.ORG link : CVE-2023-40547


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • shim
CWE
CWE-787

Out-of-bounds Write

CWE-346

Origin Validation Error