Lucene search

K
redosRedosROS-20240411-07
HistoryApr 11, 2024 - 12:00 a.m.

ROS-20240411-07

2024-04-1100:00:00
redos.red-soft.ru
8
uefi
bootloader
vulnerabilities
buffer overflow
out-of-bounds
denial of service
arbitrary code execution
special elements

8.3 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.2%

A vulnerability in the UEFI shim bootloader is related to errors in the MZ binary format. Exploitation of the vulnerability could
allow an attacker to cause a denial of service

The shim UEFI bootloader vulnerability is related to out-of-bounds read errors when attempting to check the
SBAT information. Exploitation of the vulnerability could allow an attacker to cause a denial of service

UEFI shim bootloader vulnerability is related to a buffer overflow for 32-bit systems due to a
addition operation involving a user-controlled value analyzed from a PE binary file,
used by Shim. Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability exists in the shim UEFI bootloader due to failure to take measures to neutralize special elements.
Exploitation of the vulnerability could allow a remote attacker to execute arbitrary code
by sending a specially crafted HTTP request

Vulnerability in UEFI shim loader is related to a failure to create a new variable. Exploitation of the vulnerability
could allow an attacker to cause a denial of service

The shim UEFI bootloader vulnerability is related to out-of-bounds read errors due to a lack of
proper bounds checking during PE binary loading. Exploitation of the vulnerability could allow an
an attacker to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64shim-x64<= 15.8-1.3UNKNOWN

8.3 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.2%