Rapid7 Vulnerability & Exploit Database

RHSA-2014:1801: shim security update

Back to Search

RHSA-2014:1801: shim security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
10/22/2014
Created
07/25/2018
Added
11/05/2014
Modified
07/04/2017

Description

Shim is the initial UEFI bootloader that handles chaining to a trusted fullbootloader under secure boot environments.A heap-based buffer overflow flaw was found the way shim parsed certainIPv6 addresses. If IPv6 network booting was enabled, a malicious servercould supply a crafted IPv6 address that would cause shim to crash or,potentially, execute arbitrary code. (CVE-2014-3676)An out-of-bounds memory write flaw was found in the way shim processedcertain Machine Owner Keys (MOKs). A local attacker could potentially usethis flaw to execute arbitrary code on the system. (CVE-2014-3677)An out-of-bounds memory read flaw was found in the way shim parsed certainIPv6 packets. A specially crafted DHCPv6 packet could possibly cause shimto crash, preventing the system from booting if IPv6 booting was enabled.(CVE-2014-3675)Red Hat would like to thank the SUSE Security Team for reporting theseissues.All shim users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.

Solution(s)

  • redhat-upgrade-mokutil
  • redhat-upgrade-shim
  • redhat-upgrade-shim-debuginfo
  • redhat-upgrade-shim-unsigned

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;