8.3 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.025 Low
EPSS
Percentile
90.3%
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
www.openwall.com/lists/oss-security/2024/01/26/1
access.redhat.com/errata/RHSA-2024:1834
access.redhat.com/errata/RHSA-2024:1835
access.redhat.com/errata/RHSA-2024:1873
access.redhat.com/errata/RHSA-2024:1876
access.redhat.com/errata/RHSA-2024:1883
access.redhat.com/errata/RHSA-2024:1902
access.redhat.com/errata/RHSA-2024:1903
access.redhat.com/errata/RHSA-2024:1959
access.redhat.com/errata/RHSA-2024:2086
access.redhat.com/security/cve/CVE-2023-40547
bugzilla.redhat.com/show_bug.cgi?id=2234589
lists.debian.org/debian-lts-announce/2024/05/msg00009.html
8.3 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.025 Low
EPSS
Percentile
90.3%