ID CVE-2022-28737
Summary There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:shim:-:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:-:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:12:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:12:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:13:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:13:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:14:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:14:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.3:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.3:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.3:rc3:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.3:rc3:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.3:rc4:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.3:rc4:*:*:*:*:*:*
  • cpe:2.3:a:redhat:shim:15.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:shim:15.4:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 28-07-2023 - 15:33
Published 20-07-2023 - 01:15
Last modified 28-07-2023 - 15:33
Back to Top