CVE-2023-40547

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40547
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40547.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-40547
Downstream
Related
Published
2024-01-25T16:15:07Z
Modified
2025-10-10T04:36:33.102844Z
Severity
  • 8.3 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.

References

Affected packages

Git / github.com/rhboot/shim

Affected ranges

Type
GIT
Repo
https://github.com/rhboot/shim
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3
0.4
0.5
0.7
0.8
0.9

Other

11
12
13
14
15

15.*

15.2
15.3
15.4
15.5
15.5-rc2
15.6
15.6-rc2
15.7

shim-15.*

shim-15.3-rc1
shim-15.3-rc2
shim-15.3-rc3
shim-15.3-rc4