CVE-2023-40547
EUVD-2023-4511825.01.2024, 16:15
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| redhat | shim | 𝑥 < 15.8 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | enterprise_linux | 9.0 |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||
| Windows 11 |
| ||||||||||
| Windows Server 2012 |
| ||||||||||
| Windows Server 2012 R2 |
| ||||||||||
| Windows Server 2016 |
| ||||||||||
| Windows Server 2019 |
| ||||||||||
| Windows Server 2022 |
|
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| secureboot-db |
| ||||||||||||||||||
| shim |
| ||||||||||||||||||
| shim-signed |
|
Common Weakness Enumeration
References