Shim: out-of-bounds read in verify_buffer_authenticode() malformed pe file
CVE-2023-40549

6.2MEDIUM

Summary

A flaw has been identified in Shim due to inadequate boundary checks during the loading of Portable Executable (PE) binaries. This vulnerability permits attackers to craft malicious PE binaries that exploit the flaw, subsequently causing the Shim component to crash. Such interruptions can result in service denial, posing risks to the stability and security of affected systems. It is crucial for users and administrators of impacted Red Hat products to apply available patches to mitigate potential threats.

Affected Version(s)

Red Hat Enterprise Linux 7 0:15.8-3.el7

Red Hat Enterprise Linux 7 0:15.8-1.el7

Red Hat Enterprise Linux 8 0:15.8-4.el8_9

References

CVSS V3.1

Score:
6.2
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.