Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2023-40547: Important: shim security update (CESA-2024:1959)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2023-40547: Important: shim security update (CESA-2024:1959)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/25/2024
Created
04/24/2024
Added
04/24/2024
Modified
04/26/2024

Description

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

Solution(s)

  • centos-upgrade-mokutil
  • centos-upgrade-mokutil-debuginfo
  • centos-upgrade-shim-ia32
  • centos-upgrade-shim-unsigned-ia32
  • centos-upgrade-shim-unsigned-x64
  • centos-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;