Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems
CVE-2023-40548

7.4HIGH

Summary

A buffer overflow vulnerability exists in the Shim component of the 32-bit system environment. It arises from an addition operation that involves user-controlled values parsed from Portable Executable (PE) binaries used by Shim. This maliciously manipulated value is leveraged during memory allocation processes, which can lead to heap-based buffer overflow conditions. The potential consequences of this flaw include memory corruption that may result in system crashes or impact data integrity during crucial boot sequences. Rigorous attention to the associated advisories is recommended for users utilizing affected Shim versions.

Affected Version(s)

Red Hat Enterprise Linux 7 0:15.8-3.el7

Red Hat Enterprise Linux 7 0:15.8-1.el7

Red Hat Enterprise Linux 8 0:15.8-4.el8_9

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.