Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-40548
HistoryJan 23, 2024 - 12:00 a.m.

CVE-2023-40548

2024-01-2300:00:00
ubuntu.com
ubuntu.com
10
buffer overflow
shim
32-bit system
user-controlled value
memory corruption
system crash
data integrity
boot phase
heap-based
uefi
security vulnerability

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

A buffer overflow was found in Shim in the 32-bit system. The overflow
happens due to an addition operation involving a user-controlled value
parsed from the PE binary being used by Shim. This value is further used
for memory allocation operations, leading to a heap-based buffer overflow.
This flaw causes memory corruption and can lead to a crash or data
integrity issues during the boot phase.

Bugs

Notes

Author Note
eslerm UEFI Security Response Team states that dbx update is not needed secureboot-db should only ever be updated after shim secureboot-db is not updated on ESM releases as doing so would revoke install media keys Note that key revocation is required to protect against evil housekeeper attacks (such as BlackLotus)

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%