Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-40548
HistoryJan 29, 2024 - 3:15 p.m.

CVE-2023-40548

2024-01-2915:15:08
Debian Security Bug Tracker
security-tracker.debian.org
12
buffer overflow
shim
user-controlled value
pe binary
memory corruption
heap-based
data integrity
crash
unix

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%