Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2023-40548: shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2023-40548: shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:H/Au:N/C:P/I:P/A:C)
Published
01/29/2024
Created
04/17/2024
Added
04/17/2024
Modified
04/30/2024

Description

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

Solution(s)

  • redhat-upgrade-mokutil
  • redhat-upgrade-mokutil-debuginfo
  • redhat-upgrade-shim-ia32
  • redhat-upgrade-shim-unsigned-ia32
  • redhat-upgrade-shim-unsigned-x64
  • redhat-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;