Rapid7 Vulnerability & Exploit Database

Oracle Linux: (CVE-2023-40548) (Multiple Advisories): shim security update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: (CVE-2023-40548) (Multiple Advisories): shim security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/29/2024
Created
05/22/2024
Added
04/24/2024
Modified
05/03/2024

Description

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

Solution(s)

  • oracle-linux-upgrade-mokutil
  • oracle-linux-upgrade-shim
  • oracle-linux-upgrade-shim-aa64
  • oracle-linux-upgrade-shim-ia32
  • oracle-linux-upgrade-shim-signed
  • oracle-linux-upgrade-shim-unsigned-x64
  • oracle-linux-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;