Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2023-40548: Important: shim security update (CESA-2024:1959)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

CentOS Linux: CVE-2023-40548: Important: shim security update (CESA-2024:1959)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/29/2024
Created
04/24/2024
Added
04/24/2024
Modified
04/26/2024

Description

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

Solution(s)

  • centos-upgrade-mokutil
  • centos-upgrade-mokutil-debuginfo
  • centos-upgrade-shim-ia32
  • centos-upgrade-shim-unsigned-ia32
  • centos-upgrade-shim-unsigned-x64
  • centos-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;