Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-40547
Vulnerability from cvelistv5
Published
2024-01-25 15:54
Modified
2024-11-24 14:19
Severity ?
EPSS score ?
Summary
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Red Hat | Red Hat Enterprise Linux 7 |
Unaffected: 0:15.8-3.el7 < * cpe:/o:redhat:enterprise_linux:7::client cpe:/o:redhat:enterprise_linux:7::server cpe:/o:redhat:enterprise_linux:7::workstation |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/26/1" }, { "name": "RHSA-2024:1834", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "RHSA-2024:1835", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "RHSA-2024:1873", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "RHSA-2024:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "RHSA-2024:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "RHSA-2024:1902", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "RHSA-2024:1903", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "RHSA-2024:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "RHSA-2024:2086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "name": "RHBZ#2234589", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "shim-signed", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-1.el7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-x64", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-aarch64", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-x64", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:9.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9_2", "versionType": "rpm" } ] } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Bill Demirkapi (Microsoft Security Response Center) for reporting this issue." } ], "datePublic": "2024-01-23T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Important" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-24T14:19:00.724Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:1834", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "RHSA-2024:1835", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "RHSA-2024:1873", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "RHSA-2024:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "RHSA-2024:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "RHSA-2024:1902", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "RHSA-2024:1903", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "RHSA-2024:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "RHSA-2024:2086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "name": "RHBZ#2234589", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" } ], "timeline": [ { "lang": "en", "time": "2023-05-05T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-01-23T00:00:00+00:00", "value": "Made public." } ], "title": "Shim: rce in http boot support may lead to secure boot bypass", "workarounds": [ { "lang": "en", "value": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot." } ], "x_redhatCweChain": "CWE-346-\u003eCWE-787: Origin Validation Error leads to Out-of-bounds Write" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-40547", "datePublished": "2024-01-25T15:54:23.102Z", "dateReserved": "2023-08-15T20:04:15.615Z", "dateUpdated": "2024-11-24T14:19:00.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-40547\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-25T16:15:07.717\",\"lastModified\":\"2024-11-21T08:19:41.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Shim. El soporte de arranque Shim conf\u00eda en los valores controlados por el atacante al analizar una respuesta HTTP. Este fallo permite a un atacante manipular una solicitud HTTP maliciosa espec\u00edfica, lo que lleva a una escritura fuera de los l\u00edmites completamente controlada primitiva y a un compromiso completo del sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8\",\"matchCriteriaId\":\"01639865-3664-4034-BCFB-F4E09AF37F28\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1834\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1835\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1873\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1876\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1883\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1902\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1959\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2086\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-40547\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2234589\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/01/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1883\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-40547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2234589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-qjqj-4cq6-6f2f
Vulnerability from github
Published
2024-01-25 18:30
Modified
2024-06-10 18:30
Severity ?
Details
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
{ "affected": [], "aliases": [ "CVE-2023-40547" ], "database_specific": { "cwe_ids": [ "CWE-125", "CWE-346", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-25T16:15:07Z", "severity": "HIGH" }, "details": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.", "id": "GHSA-qjqj-4cq6-6f2f", "modified": "2024-06-10T18:30:51Z", "published": "2024-01-25T18:30:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/26/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2024_1959
Vulnerability from csaf_redhat
Published
2024-04-23 01:00
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest
version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nIMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest\nversion: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1959", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "RHEL-2155", "url": "https://issues.redhat.com/browse/RHEL-2155" }, { "category": "external", "summary": "RHEL-4382", "url": "https://issues.redhat.com/browse/RHEL-4382" }, { "category": "external", "summary": "RHEL-4390", "url": "https://issues.redhat.com/browse/RHEL-4390" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1959.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:40+00:00", "generator": { "date": "2024-11-24T14:20:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1959", "initial_release_date": "2024-04-23T01:00:12+00:00", "revision_history": [ { "date": "2024-04-23T01:00:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-23T01:00:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-3.el7.src", "product": { "name": "shim-0:15.8-3.el7.src", "product_id": "shim-0:15.8-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el7?arch=src" } } }, { "category": "product_version", "name": "shim-signed-0:15.8-1.el7.src", "product": { "name": "shim-signed-0:15.8-1.el7.src", "product_id": "shim-signed-0:15.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-signed@15.8-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product_id": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-ia32@15.8-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product_id": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "mokutil-0:15.8-1.el7.x86_64", "product": { "name": "mokutil-0:15.8-1.el7.x86_64", "product_id": "mokutil-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mokutil@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-ia32-0:15.8-1.el7.x86_64", "product": { "name": "shim-ia32-0:15.8-1.el7.x86_64", "product_id": "shim-ia32-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-1.el7.x86_64", "product": { "name": "shim-x64-0:15.8-1.el7.x86_64", "product_id": "shim-x64-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product_id": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mokutil-debuginfo@15.8-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1873
Vulnerability from csaf_redhat
Published
2024-04-18 01:42
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, E4S Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, E4S Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1873", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1873.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:11+00:00", "generator": { "date": "2024-11-24T14:20:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1873", "initial_release_date": "2024-04-18T01:42:32+00:00", "revision_history": [ { "date": "2024-04-18T01:42:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:42:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_4.src", "product": { "name": "shim-0:15.8-2.el8_4.src", "product_id": "shim-0:15.8-2.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_4.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_4.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_4.x86_64", "product_id": "shim-x64-0:15.8-2.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1876
Vulnerability from csaf_redhat
Published
2024-04-18 01:47
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim bug fix update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1876", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1876.json" } ], "title": "Red Hat Security Advisory: shim bug fix update", "tracking": { "current_release_date": "2024-11-24T14:20:01+00:00", "generator": { "date": "2024-11-24T14:20:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1876", "initial_release_date": "2024-04-18T01:47:33+00:00", "revision_history": [ { "date": "2024-04-18T01:47:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:47:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-3.el9_2.src", "product": { "name": "shim-0:15.8-3.el9_2.src", "product_id": "shim-0:15.8-3.el9_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el9_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-3.el9_2.aarch64", "product": { "name": "shim-aa64-0:15.8-3.el9_2.aarch64", "product_id": "shim-aa64-0:15.8-3.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-3.el9_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-x64-0:15.8-3.el9_2.x86_64", "product": { "name": "shim-x64-0:15.8-3.el9_2.x86_64", "product_id": "shim-x64-0:15.8-3.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-3.el9_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el9_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src" }, "product_reference": "shim-0:15.8-3.el9_2.src", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64" }, "product_reference": "shim-aa64-0:15.8-3.el9_2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" }, "product_reference": "shim-x64-0:15.8-3.el9_2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1835
Vulnerability from csaf_redhat
Published
2024-04-16 13:45
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1835", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1835.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:30+00:00", "generator": { "date": "2024-11-24T14:19:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1835", "initial_release_date": "2024-04-16T13:45:47+00:00", "revision_history": [ { "date": "2024-04-16T13:45:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-16T13:45:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product_id": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2.el9?arch=src" } } }, { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el9.src", "product": { "name": "shim-unsigned-x64-0:15.8-2.el9.src", "product_id": "shim-unsigned-x64-0:15.8-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el9?arch=src" } } }, { "category": "product_version", "name": "shim-0:15.8-3.el9.src", "product": { "name": "shim-0:15.8-3.el9.src", "product_id": "shim-0:15.8-3.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product_id": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2.el9?arch=aarch64" } } }, { "category": "product_version", "name": "shim-aa64-0:15.8-3.el9.aarch64", "product": { "name": "shim-aa64-0:15.8-3.el9.aarch64", "product_id": "shim-aa64-0:15.8-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-3.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product_id": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el9?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-3.el9.x86_64", "product": { "name": "shim-x64-0:15.8-3.el9.x86_64", "product_id": "shim-x64-0:15.8-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-3.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64" }, "product_reference": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src" }, "product_reference": "shim-unsigned-aarch64-0:15.8-2.el9.src", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el9.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src" }, "product_reference": "shim-0:15.8-3.el9.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64" }, "product_reference": "shim-aa64-0:15.8-3.el9.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64" }, "product_reference": "shim-x64-0:15.8-3.el9.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el9.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el9.src", "relates_to_product_reference": "CRB-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1883
Vulnerability from csaf_redhat
Published
2024-04-18 01:56
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.8 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.8 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1883", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1883.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:51+00:00", "generator": { "date": "2024-11-24T14:19:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1883", "initial_release_date": "2024-04-18T01:56:22+00:00", "revision_history": [ { "date": "2024-04-18T01:56:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:56:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el8.src", "product": { "name": "shim-unsigned-x64-0:15.8-2.el8.src", "product_id": "shim-unsigned-x64-0:15.8-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el8?arch=src" } } }, { "category": "product_version", "name": "shim-0:15.8-2.el8.src", "product": { "name": "shim-0:15.8-2.el8.src", "product_id": "shim-0:15.8-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product_id": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8.x86_64", "product_id": "shim-ia32-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8.x86_64", "product_id": "shim-x64-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-2.el8.aarch64", "product": { "name": "shim-aa64-0:15.8-2.el8.aarch64", "product_id": "shim-aa64-0:15.8-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-2.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src" }, "product_reference": "shim-0:15.8-2.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-2.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64" }, "product_reference": "shim-aa64-0:15.8-2.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el8.src", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1903
Vulnerability from csaf_redhat
Published
2024-04-18 17:42
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim bug fix update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1903", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1903.json" } ], "title": "Red Hat Security Advisory: shim bug fix update", "tracking": { "current_release_date": "2024-11-24T14:20:31+00:00", "generator": { "date": "2024-11-24T14:20:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1903", "initial_release_date": "2024-04-18T17:42:35+00:00", "revision_history": [ { "date": "2024-04-18T17:42:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T17:42:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-4.el9_3.src", "product": { "name": "shim-0:15.8-4.el9_3.src", "product_id": "shim-0:15.8-4.el9_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-4.el9_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-4.el9_3.aarch64", "product": { "name": "shim-aa64-0:15.8-4.el9_3.aarch64", "product_id": "shim-aa64-0:15.8-4.el9_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-4.el9_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-x64-0:15.8-4.el9_3.x86_64", "product": { "name": "shim-x64-0:15.8-4.el9_3.x86_64", "product_id": "shim-x64-0:15.8-4.el9_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-4.el9_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-4.el9_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src" }, "product_reference": "shim-0:15.8-4.el9_3.src", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-4.el9_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64" }, "product_reference": "shim-aa64-0:15.8-4.el9_3.aarch64", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-4.el9_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" }, "product_reference": "shim-x64-0:15.8-4.el9_3.x86_64", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_2086
Vulnerability from csaf_redhat
Published
2024-04-29 12:31
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.6 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2086", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2086.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:50+00:00", "generator": { "date": "2024-11-24T14:20:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2086", "initial_release_date": "2024-04-29T12:31:44+00:00", "revision_history": [ { "date": "2024-04-29T12:31:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-29T12:31:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_6.src", "product": { "name": "shim-0:15.8-2.el8_6.src", "product_id": "shim-0:15.8-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-2.el8_6.aarch64", "product": { "name": "shim-aa64-0:15.8-2.el8_6.aarch64", "product_id": "shim-aa64-0:15.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-2.el8_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_6.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_6.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_6.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_6.x86_64", "product_id": "shim-x64-0:15.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_6.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src" }, "product_reference": "shim-0:15.8-2.el8_6.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64" }, "product_reference": "shim-aa64-0:15.8-2.el8_6.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_6.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_6.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1834
Vulnerability from csaf_redhat
Published
2024-04-16 13:38
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1834", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1834.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:40+00:00", "generator": { "date": "2024-11-24T14:19:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1834", "initial_release_date": "2024-04-16T13:38:02+00:00", "revision_history": [ { "date": "2024-04-16T13:38:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-16T13:38:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_2.src", "product": { "name": "shim-0:15.8-2.el8_2.src", "product_id": "shim-0:15.8-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_2.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_2.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_2.x86_64", "product_id": "shim-x64-0:15.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1902
Vulnerability from csaf_redhat
Published
2024-04-18 17:44
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1902", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1902.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:20+00:00", "generator": { "date": "2024-11-24T14:20:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1902", "initial_release_date": "2024-04-18T17:44:10+00:00", "revision_history": [ { "date": "2024-04-18T17:44:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T17:44:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-4.el8_9.src", "product": { "name": "shim-0:15.8-4.el8_9.src", "product_id": "shim-0:15.8-4.el8_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-4.el8_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-4.el8_9.aarch64", "product": { "name": "shim-aa64-0:15.8-4.el8_9.aarch64", "product_id": "shim-aa64-0:15.8-4.el8_9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-4.el8_9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-4.el8_9.x86_64", "product": { "name": "shim-ia32-0:15.8-4.el8_9.x86_64", "product_id": "shim-ia32-0:15.8-4.el8_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-4.el8_9?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-4.el8_9.x86_64", "product": { "name": "shim-x64-0:15.8-4.el8_9.x86_64", "product_id": "shim-x64-0:15.8-4.el8_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-4.el8_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-4.el8_9.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src" }, "product_reference": "shim-0:15.8-4.el8_9.src", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-4.el8_9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64" }, "product_reference": "shim-aa64-0:15.8-4.el8_9.aarch64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-4.el8_9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64" }, "product_reference": "shim-ia32-0:15.8-4.el8_9.x86_64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-4.el8_9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" }, "product_reference": "shim-x64-0:15.8-4.el8_9.x86_64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
wid-sec-w-2024-1313
Vulnerability from csaf_certbund
Published
2024-06-06 22:00
Modified
2024-12-01 23:00
Summary
IBM QRadar SIEM: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsmaßnahmen zu umgehen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsma\u00dfnahmen zu umgehen und beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1313 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1313.json" }, { "category": "self", "summary": "WID-SEC-2024-1313 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1313" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-06-06", "url": "https://www.ibm.com/support/pages/node/7156667" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-01T23:00:00.000+00:00", "generator": { "date": "2024-12-02T11:03:55.226+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1313", "initial_release_date": "2024-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-12-01T23:00:00.000+00:00", "number": "2", "summary": "Korrektur Plattformauswahl" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP8 IF03", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP8 IF03", "product_id": "T035249" } }, { "category": "product_version", "name": "7.5.0 UP8 IF03", "product": { "name": "IBM QRadar SIEM 7.5.0 UP8 IF03", "product_id": "T035249-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8_if03" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22243", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-22243" }, { "cve": "CVE-2024-22259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-22259" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40551" }, { "cve": "CVE-2023-4408", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-4408" }, { "cve": "CVE-2023-50387", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-50387" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler besteht in rhboot-Shim aufgrund eines Out-of-Bound-Lesefehlers in der Funktion verify_buffer_sbat(). Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-3758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in der SSSD-Komponente. Die GPO-Richtlinie f\u00fcr authentifizierte Benutzer wird nicht konsistent angewendet. Ein Angreifer aus einem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen bzgl. Autorisierung zu umgehen." } ], "product_status": { "known_affected": [ "T035249" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2023-3758" } ] }
wid-sec-w-2024-2100
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2024-09-10 22:00
Summary
IBM Power Hardware Management Console: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Hardware Management Console (HMC) von IBM ist ein System zur Virtualisierung von IBM Servern.
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM Power Hardware Management Console ausnutzen, um beliebigen Programmcode auszuführen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Hardware Management Console (HMC) von IBM ist ein System zur Virtualisierung von IBM Servern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in IBM Power Hardware Management Console ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2100 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2100.json" }, { "category": "self", "summary": "WID-SEC-2024-2100 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2100" }, { "category": "external", "summary": "IBM Security Bulletin 7168007 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168007" }, { "category": "external", "summary": "IBM Security Bulletin 7168008 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168008" }, { "category": "external", "summary": "IBM Security Bulletin 7168013 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168013" }, { "category": "external", "summary": "IBM Security Bulletin 7168015 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168015" }, { "category": "external", "summary": "IBM Security Bulletin 7168014 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168014" }, { "category": "external", "summary": "IBM Security Bulletin 7168016 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168016" }, { "category": "external", "summary": "IBM Security Bulletin 7168017 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168017" }, { "category": "external", "summary": "IBM Security Bulletin 7168018 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168018" }, { "category": "external", "summary": "IBM Security Bulletin 7168019 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168019" }, { "category": "external", "summary": "IBM Security Bulletin 7168020 vom 2024-09-10", "url": "https://www.ibm.com/support/pages/node/7168020" } ], "source_lang": "en-US", "title": "IBM Power Hardware Management Console: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-09-10T22:00:00.000+00:00", "generator": { "date": "2024-09-11T08:15:41.154+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-2100", "initial_release_date": "2024-09-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV10.2.1040.0 SP2 x86", "product": { "name": "IBM Power Hardware Management Console \u003cV10.2.1040.0 SP2 x86", "product_id": "T037441" } }, { "category": "product_version", "name": "V10.2.1040.0 SP2 x86", "product": { "name": "IBM Power Hardware Management Console V10.2.1040.0 SP2 x86", "product_id": "T037441-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.2.1040.0_sp2_x86" } } }, { "category": "product_version_range", "name": "\u003cV10.2.1040.0 SP2 ppc", "product": { "name": "IBM Power Hardware Management Console \u003cV10.2.1040.0 SP2 ppc", "product_id": "T037443" } }, { "category": "product_version", "name": "V10.2.1040.0 SP2 ppc", "product": { "name": "IBM Power Hardware Management Console V10.2.1040.0 SP2 ppc", "product_id": "T037443-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.2.1040.0_sp2_ppc" } } }, { "category": "product_version_range", "name": "\u003cV10.3.1060.0 x86", "product": { "name": "IBM Power Hardware Management Console \u003cV10.3.1060.0 x86", "product_id": "T037444" } }, { "category": "product_version", "name": "V10.3.1060.0 x86", "product": { "name": "IBM Power Hardware Management Console V10.3.1060.0 x86", "product_id": "T037444-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.3.1060.0_x86" } } }, { "category": "product_version_range", "name": "\u003cV10.3.1060.0 ppc", "product": { "name": "IBM Power Hardware Management Console \u003cV10.3.1060.0 ppc", "product_id": "T037445" } }, { "category": "product_version", "name": "V10.3.1060.0 ppc", "product": { "name": "IBM Power Hardware Management Console V10.3.1060.0 ppc", "product_id": "T037445-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10.3.1060.0_ppc" } } } ], "category": "product_name", "name": "Power Hardware Management Console" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "In IBM Power Hardware Management Console existieren mehrere Schwachstellen. Diese Schwachstellen betreffen die rhboot-Shim-Komponente und werden durch Fehler wie NULL-Zeiger-Dereferenzierung, Out-of-Bounds-Schreib- und Lesevorg\u00e4nge und Integer-\u00dcberl\u00e4ufe verursacht. Ein lokaler Angreifer oder ein Angreifer aus einem benachbarten Netzwerk kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-40551" }, { "cve": "CVE-2023-6135", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in der IBM Power Hardware Management Console. Dieser Fehler betrifft die Mozilla Network Security Services NIST-Kurve, die in Mozilla Firefox verwendet wird, und zwar durch einen als Minerva bekannten Side-Channel-Angriff, der die Wiederherstellung des privaten Schl\u00fcssels erm\u00f6glicht. Ein anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er ein Opfer dazu bringt, eine speziell gestaltete Website zu besuchen, um vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-6135" }, { "cve": "CVE-2023-39615", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler besteht in Xmlsoft Libxml2 aufgrund eines Puffer\u00fcberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er eine manipulierte XML-Datei bereitstellt." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-39615" }, { "cve": "CVE-2023-5388", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler ist auf eine beobachtbare Zeitdiskrepanz in der numerischen Bibliothek zur\u00fcckzuf\u00fchren, die in NSS f\u00fcr die RSA-Kryptographie verwendet wird. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben und diese Informationen f\u00fcr weitere Angriffe zu verwenden." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-5388" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM Power Hardware Management Console. Diese Fehler betreffen die OpenSSL-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Behandlung von DH-Schl\u00fcsseln und Parametern w\u00e4hrend der Schl\u00fcsselvalidierung und -erzeugung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-5678" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Diese Fehler betrifft den Apache Tomcat Server aufgrund eines Fehlers bei der Verarbeitung eines HTTP/2-Streams. Durch das Senden speziell gestalteter HTTP-Header kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft ISC BIND aufgrund einer unsachgem\u00e4\u00dfen Speicherzuweisung, die es erm\u00f6glicht, UPDATE-Nachrichten zu senden, was zu einer Speicherersch\u00f6pfung f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2022-3094" }, { "cve": "CVE-2023-4641", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Die shadow-utils Bibliothek ist von diesem Fehler betroffen, da Passwortinformationen unsachgem\u00e4\u00df gehandhabt werden, insbesondere weil der Puffer zum Speichern von Passw\u00f6rtern nicht gel\u00f6scht wird. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-4641" }, { "cve": "CVE-2023-22745", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft die tpm2-tss Bibliothek aufgrund einer unsachgem\u00e4\u00dfen \u00dcberpr\u00fcfung der Grenzen in den Tss2_RC_SetHandler und Tss2_RC_Decode Funktionen, was zu einem Puffer\u00fcberlauf f\u00fchrt. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-22745" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Power Hardware Management Console. Dieser Fehler betrifft die expat-Bibliothek aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Systemressourcen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er eine speziell gestaltete Anfrage mit einem \u00fcberm\u00e4\u00dfig gro\u00dfen Token sendet." } ], "product_status": { "known_affected": [ "T037444", "T037445", "T037441", "T037443" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-52425" } ] }
wid-sec-w-2024-1835
Vulnerability from csaf_certbund
Published
2024-08-13 22:00
Modified
2024-08-26 22:00
Summary
Microsoft Windows: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Windows ist ein Betriebssystem von Microsoft.
Windows Server 2016 ist ein Betriebssystem von Microsoft.
Windows Server 2019 ist ein Betriebssystem von Microsoft.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 ausnutzen, um beliebigen Programmcode auszuführen, beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Windows ist ein Betriebssystem von Microsoft.\r\nWindows Server 2016 ist ein Betriebssystem von Microsoft.\r\nWindows Server 2019 ist ein Betriebssystem von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1835 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1835.json" }, { "category": "self", "summary": "WID-SEC-2024-1835 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1835" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-08-13", "url": "https://msrc.microsoft.com/update-guide" }, { "category": "external", "summary": "PoC CVE-2024-38063 vom 2024-08-26", "url": "https://github.com/ynwarcs/CVE-2024-38063" } ], "source_lang": "en-US", "title": "Microsoft Windows: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-26T22:00:00.000+00:00", "generator": { "date": "2024-08-27T08:07:19.027+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-1835", "initial_release_date": "2024-08-13T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-13T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-26T22:00:00.000+00:00", "number": "2", "summary": "PoC f\u00fcr CVE-2024-38063 verf\u00fcgbar" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "Remote Desktop client for Desktop", "product": { "name": "Microsoft Windows Remote Desktop client for Desktop", "product_id": "T023160", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:remote_desktop_client_for_desktop" } } } ], "category": "product_name", "name": "Windows" }, { "branches": [ { "category": "product_version", "name": "Version 1607", "product": { "name": "Microsoft Windows 10 Version 1607", "product_id": "T011520", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1607" } } }, { "category": "product_version", "name": "Version 21H2", "product": { "name": "Microsoft Windows 10 Version 21H2", "product_id": "T021306", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_21h2" } } }, { "category": "product_version", "name": "Version 22H2", "product": { "name": "Microsoft Windows 10 Version 22H2", "product_id": "T025256", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_22h2" } } }, { "category": "product_name", "name": "Microsoft Windows 10", "product": { "name": "Microsoft Windows 10", "product_id": "T025566", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:windows_terminal" } } }, { "category": "product_version", "name": "Version 1809", "product": { "name": "Microsoft Windows 10 Version 1809", "product_id": "T034033", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_10:version_1809" } } } ], "category": "product_name", "name": "Windows 10" }, { "branches": [ { "category": "product_version", "name": "Version 24H2", "product": { "name": "Microsoft Windows 11 Version 24H2", "product_id": "T025567", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:windows_terminal" } } }, { "category": "product_version", "name": "Version 23H2", "product": { "name": "Microsoft Windows 11 Version 23H2", "product_id": "T031172", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_23h2" } } }, { "category": "product_version", "name": "Version 22H2", "product": { "name": "Microsoft Windows 11 Version 22H2", "product_id": "T034034", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_11:version_22h2" } } }, { "category": "product_version_range", "name": "version 21H2", "product": { "name": "Microsoft Windows 11 version 21H2", "product_id": "T034035" } } ], "category": "product_name", "name": "Windows 11" }, { "branches": [ { "category": "product_version", "name": "2008 SP2", "product": { "name": "Microsoft Windows Server 2008 SP2", "product_id": "T012853", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server:2008_sp2" } } }, { "category": "product_version", "name": "2008 R2 SP1", "product": { "name": "Microsoft Windows Server 2008 R2 SP1", "product_id": "T012855", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1" } } } ], "category": "product_name", "name": "Windows Server" }, { "category": "product_name", "name": "Microsoft Windows Server 2012", "product": { "name": "Microsoft Windows Server 2012", "product_id": "T006125", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012:::server_core_installation" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012 R2", "product": { "name": "Microsoft Windows Server 2012 R2", "product_id": "T014786", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012_r2:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2016", "product": { "name": "Microsoft Windows Server 2016", "product_id": "T010224", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2016:server_2016::server_core_installation" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2019", "product": { "name": "Microsoft Windows Server 2019", "product_id": "T014557", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2019:server_core_installation" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Windows Server 2022", "product": { "name": "Microsoft Windows Server 2022", "product_id": "T025255", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:datacenter_azure_edition" } } }, { "category": "product_version", "name": "23H2 Edition", "product": { "name": "Microsoft Windows Server 2022 23H2 Edition", "product_id": "T034036", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition" } } } ], "category": "product_name", "name": "Windows Server 2022" } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2601", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2022-2601" }, { "cve": "CVE-2022-3775", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2022-3775" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2023-40547" }, { "cve": "CVE-2024-29995", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-29995" }, { "cve": "CVE-2024-37968", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-37968" }, { "cve": "CVE-2024-38063", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38063" }, { "cve": "CVE-2024-38106", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38106" }, { "cve": "CVE-2024-38107", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38107" }, { "cve": "CVE-2024-38114", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38114" }, { "cve": "CVE-2024-38115", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38115" }, { "cve": "CVE-2024-38116", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38116" }, { "cve": "CVE-2024-38117", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38117" }, { "cve": "CVE-2024-38118", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38118" }, { "cve": "CVE-2024-38120", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38120" }, { "cve": "CVE-2024-38121", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38121" }, { "cve": "CVE-2024-38122", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38122" }, { "cve": "CVE-2024-38123", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38123" }, { "cve": "CVE-2024-38125", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38125" }, { "cve": "CVE-2024-38126", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38126" }, { "cve": "CVE-2024-38127", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38127" }, { "cve": "CVE-2024-38128", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38128" }, { "cve": "CVE-2024-38130", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38130" }, { "cve": "CVE-2024-38131", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38131" }, { "cve": "CVE-2024-38132", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38132" }, { "cve": "CVE-2024-38133", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38133" }, { "cve": "CVE-2024-38134", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38134" }, { "cve": "CVE-2024-38135", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38135" }, { "cve": "CVE-2024-38136", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38136" }, { "cve": "CVE-2024-38137", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38137" }, { "cve": "CVE-2024-38138", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38138" }, { "cve": "CVE-2024-38140", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38140" }, { "cve": "CVE-2024-38141", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38141" }, { "cve": "CVE-2024-38142", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38142" }, { "cve": "CVE-2024-38143", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38143" }, { "cve": "CVE-2024-38144", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38144" }, { "cve": "CVE-2024-38145", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38145" }, { "cve": "CVE-2024-38146", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38146" }, { "cve": "CVE-2024-38147", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38147" }, { "cve": "CVE-2024-38148", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38148" }, { "cve": "CVE-2024-38150", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38150" }, { "cve": "CVE-2024-38151", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38151" }, { "cve": "CVE-2024-38152", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38152" }, { "cve": "CVE-2024-38153", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38153" }, { "cve": "CVE-2024-38154", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38154" }, { "cve": "CVE-2024-38155", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38155" }, { "cve": "CVE-2024-38159", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38159" }, { "cve": "CVE-2024-38160", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38160" }, { "cve": "CVE-2024-38161", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38161" }, { "cve": "CVE-2024-38163", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38163" }, { "cve": "CVE-2024-38165", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38165" }, { "cve": "CVE-2024-38178", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38178" }, { "cve": "CVE-2024-38180", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38180" }, { "cve": "CVE-2024-38184", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38184" }, { "cve": "CVE-2024-38185", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38185" }, { "cve": "CVE-2024-38186", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38186" }, { "cve": "CVE-2024-38187", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38187" }, { "cve": "CVE-2024-38191", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38191" }, { "cve": "CVE-2024-38193", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38193" }, { "cve": "CVE-2024-38196", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38196" }, { "cve": "CVE-2024-38198", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38198" }, { "cve": "CVE-2024-38199", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38199" }, { "cve": "CVE-2024-38213", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38213" }, { "cve": "CVE-2024-38214", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38214" }, { "cve": "CVE-2024-38215", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38215" }, { "cve": "CVE-2024-38223", "notes": [ { "category": "description", "text": "In Microsoft Windows, Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erweitern, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen. F\u00fcr die Ausnutzung einiger dieser Schwachstelle ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023160", "T006125", "T010224", "T012855", "T014557", "T012853", "T034033", "T014786", "T011520", "T031172", "T034036", "T034035", "T034034", "T021306", "T025256", "T025567", "T025566", "T025255" ] }, "release_date": "2024-08-13T22:00:00.000+00:00", "title": "CVE-2024-38223" } ] }
wid-sec-w-2024-0326
Vulnerability from csaf_certbund
Published
2024-02-08 23:00
Modified
2024-10-09 22:00
Summary
Linux "Shim": Schwachstelle ermöglicht Übernahme der Kontrolle
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein anonymer Angreifer aus dem angrenzenden Netzwerk kann eine Schwachstelle in der "Shim" Komponente von Linux-Systemen ausnutzen, um die Kontrolle über ein betroffenes System zu übernehmen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein anonymer Angreifer aus dem angrenzenden Netzwerk kann eine Schwachstelle in der \"Shim\" Komponente von Linux-Systemen ausnutzen, um die Kontrolle \u00fcber ein betroffenes System zu \u00fcbernehmen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0326 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0326.json" }, { "category": "self", "summary": "WID-SEC-2024-0326 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0326" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2484 vom 2024-03-05", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2484.html" }, { "category": "external", "summary": "Red Hat CVE-2023-40547 vom 2024-02-08", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1883 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1873 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1876 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1902 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1903 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1368-1 vom 2024-04-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018392.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1959 vom 2024-04-23", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1903 vom 2024-04-24", "url": "http://linux.oracle.com/errata/ELSA-2024-1903.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1461-1 vom 2024-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018437.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1462-1 vom 2024-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018436.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3813 vom 2024-05-14", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10", "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" } ], "source_lang": "en-US", "title": "Linux \"Shim\": Schwachstelle erm\u00f6glicht \u00dcbernahme der Kontrolle", "tracking": { "current_release_date": "2024-10-09T22:00:00.000+00:00", "generator": { "date": "2024-10-10T11:53:41.779+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0326", "initial_release_date": "2024-02-08T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-04T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "shim \u003c15.8", "product": { "name": "Open Source Linux shim \u003c15.8", "product_id": "T032628" } }, { "category": "product_version", "name": "shim 15.8", "product": { "name": "Open Source Linux shim 15.8", "product_id": "T032628-fixed", "product_identification_helper": { "cpe": "cpe:/o:open_source:linux:shim__15.8" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht in der Bootloader-Shim-Komponente, wenn die http-Boot-Unterst\u00fctzung (httpboot.c) eine HTTP-Antwort parst, was zu einem kontrollierten Out-of-bounds-Write f\u00fchren kann. W\u00e4hrend ein betroffenes System bootet, kann ein anonymer Angreifer aus dem angrenzenden Netzwerk diese Schwachstelle zur \u00dcbernahme der Kontrolle ausnutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "398363", "T032628", "T004914" ] }, "release_date": "2024-02-08T23:00:00.000+00:00", "title": "CVE-2023-40547" } ] }
wid-sec-w-2024-0903
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-10-09 22:00
Summary
Red Hat Enterprise Linux (shim): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in "shim" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in \"shim\" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0903 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0903.json" }, { "category": "self", "summary": "WID-SEC-2024-0903 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0903" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1873 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1883 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1876 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1903 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1902 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1368-1 vom 2024-04-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018392.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1959 vom 2024-04-23", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1903 vom 2024-04-24", "url": "http://linux.oracle.com/errata/ELSA-2024-1903.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1902 vom 2024-04-26", "url": "https://linux.oracle.com/errata/ELSA-2024-1902.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2086 vom 2024-04-29", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1959 vom 2024-05-03", "url": "https://linux.oracle.com/errata/ELSA-2024-1959.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3813 vom 2024-05-14", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10", "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (shim): Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-10-09T22:00:00.000+00:00", "generator": { "date": "2024-10-10T11:52:35.794+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0903", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-28T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-02T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8.2", "product": { "name": "Red Hat Enterprise Linux 8.2", "product_id": "T034282", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8.2" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T034283", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Out-of-bounds-Write-Problems, das eine vollst\u00e4ndige Kompromittierung des Systems erm\u00f6glicht. Ein benachbarter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente w\u00e4hrend der Validierung der SBAT-Informationen, was dazu f\u00fchrt, dass sensible Daten w\u00e4hrend der Boot-Phase des Systems offengelegt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht im MZ-Bin\u00e4rformat in der Shim-Komponente aufgrund eines Out-of-bounds-Read-Problems. Ein lokaler, privilegierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-40551" } ] }
gsd-2023-40547
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-40547", "id": "GSD-2023-40547" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-40547" ], "details": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.", "id": "GSD-2023-40547", "modified": "2023-12-13T01:20:43.652070Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-40547", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el7", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-1.el7", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el8_9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el9_3", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9_2", "versionType": "rpm" } ] } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "credits": [ { "lang": "en", "value": "Red Hat would like to thank Bill Demirkapi (Microsoft Security Response Center) for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-125", "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2024/01/26/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2024/01/26/1" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1834", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1835", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1873", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1876", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1883", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1902", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1903", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1959", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "https://access.redhat.com/security/cve/CVE-2023-40547", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" } ] }, "work_around": [ { "lang": "en", "value": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot." } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*", "matchCriteriaId": "01639865-3664-4034-BCFB-F4E09AF37F28", "versionEndExcluding": "15.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Shim. El soporte de arranque Shim conf\u00eda en los valores controlados por el atacante al analizar una respuesta HTTP. Este fallo permite a un atacante manipular una solicitud HTTP maliciosa espec\u00edfica, lo que lleva a una escritura fuera de los l\u00edmites completamente controlada primitiva y a un compromiso completo del sistema." } ], "id": "CVE-2023-40547", "lastModified": "2024-04-25T14:15:08.447", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-01-25T16:15:07.717", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/26/1" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-346" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] } } } }
ncsc-2024-0334
Vulnerability from csaf_ncscnl
Published
2024-08-13 18:19
Modified
2024-08-27 07:59
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service
- Omzeilen van beveiligingsmaatregel
- Manipuleren van gegevens
- Verkrijgen van verhoogde rechten
- Spoofing
- Uitvoeren van willekeurige code (root/administrator rechten)
- Uitvoeren van willekeurige code (Gebruikersrechten)
- Toegang tot systeemgegevens
Van de kwetsbaarheden met kenmerk CVE-2024-38106, CVE-2024-38107, CVE-2024-38178 en CVE-2024-38193 geeft Microsoft aan informatie te hebben dat deze actief zijn misbruikt.
De kwetsbaarheden met kenmerk CVE-2024-38106, CVE-2024-38107 en CVE-2024-38193 bevinden zich respectievelijk in de Kernel, de Power Dependency Coördinator en de Ancillary Function Driver for WinSock en stellen een lokale, geauthenticeerde kwaadwillende in staat om zich verhoogde rechten toe te kennen en code uit te voeren met SYSTEM rechten.
De kwetsbaarheid met kenmerk CVE-2024-38178 bevindt zich in de Scripting Engine en stelt een kwaadwillende in staat om willekeurige code uit te voeren met rechten van het slachtoffer. Succesvol misbruik vereist wel dat de kwaadwillende het slachtoffer misleidt om de Edge browser in 'Internet Explorer mode' laat draaien.
Van de genoemde kwetsbaarheden is geen publieke Proof-of-Concept-code of exploit beschikbaar. Het vermoeden van het NCSC is echter dat deze wel op korte termijn publiek beschikbaar zal komen. Grootschalig actief misbruik is minder waarschijnlijk, vanwege de beperkende voorwaarden van misbruik.
De ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38063 toegewezen gekregen en bevindt zich in de wijze waarop Windows het IPv6 Protocol verwerkt. Een kwaadwillende kan zonder voorafgaande authenticatie op afstand willekeurige code uitvoeren op het kwetsbare systeem door het herhaaldelijk verzenden van speciaal geprepareerde IPv6 packets. IPv6 is standaard actief. Onderzoekers hebben Proof-of-Concept-code (PoC) gepubliceerd waarmee de kwetsbaarheid kan worden aangetoond. De PoC code vereist dat het doelwit onder controle is van de onderzoeker en veroorzaakt op dit moment hooguit een memory corruption wat resulteert in een crash van het systeem. Uitvoer van willekeurige code wordt niet bereikt. De kans op grootschalig misbruik wordt hiermee groter, maar door de beperkende voorwaarde om de PoC werkend te krijgen is deze PoC niet zondermeer grootschalig op internet in te zetten. Microsoft is niet op de hoogte dat de kwetsbaarheid actief wordt misbruikt. Microsoft adviseert om als mitigerende maatregel IPv6 uit te schakelen indien dit niet strikt noodzakelijk is.
De kwetsbaarheden met kenmerk CVE-2024-21302 en CVE-2024-38202 zijn op de laatste BlackHat Conference gepubliceerd door de onderzoeker die ze ontdekt heeft. Deze kwetsbaarheden worden in de gegevens van deze maandelijkse update wel genoemd, maar in deze update worden ze niet verholpen.
Microsoft geeft aan nog aan een oplossing te werken en heeft wel mitigerende maatregelen gepubliceerd, om de dreiging van misbruik zo goed als mogelijk te beperken. Zie hiervoor de referenties naar de specifieke kwetsbaarheid.
De kwetsbaarheden stellen een kwaadwillende in staat om een roll-back uit te voeren van geïnstalleerde updates en zo het systeem weer kwetsbaar te maken voor oudere kwetsbaarheden, zonder dat dit ontdekt kan worden door het systeem. Voor het slachtoffer blijft het systeem voldoen aan de laatste beveiligingsupdates.
Succesvol misbruik is niet eenvoudig en vereist dat de kwaadwillende over verhoogde rechten beschikt op het kwetsbare systeem. Actief misbruik zal dus vermoedelijk een volgende stap in een keten zijn door een kwaadwillende die op andere wijze toegang heeft gekregen tot het kwetsbare systeem en deze kwetsbaarheden gebruikt om permanente toegang te garanderen.
```
Windows Mark of the Web (MOTW):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38213 | 6.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Compressed Folder:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38165 | 6.50 | Manipuleren van gegevens |
|----------------|------|-------------------------------------|
Windows Update Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38163 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38202 | 7.30 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Windows DNS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-37968 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Mobile Broadband:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38161 | 6.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Ancillary Function Driver for WinSock:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38193 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38141 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows IP Routing Management Snapin:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38114 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38115 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38116 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38106 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2024-38127 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38133 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38151 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38153 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2022-2601 | 8.60 | Omzeilen van beveiligingsmaatregel |
| CVE-2023-40547 | 8.30 | Omzeilen van beveiligingsmaatregel |
| CVE-2022-3775 | 7.10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38184 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38191 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38185 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38186 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38187 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Print Spooler Components:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38198 | 7.50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Power Dependency Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38107 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows SmartScreen:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38180 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Initial Machine Configuration:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38223 | 6.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Line Printer Daemon Service (LPD):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38199 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38125 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38134 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38144 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kerberos:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-29995 | 8.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Security Center:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38155 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Scripting:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38178 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Local Security Authority Server (lsasrv):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38118 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38122 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows NTFS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38117 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Routing and Remote Access Service (RRAS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38121 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38128 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38130 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38154 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38120 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38214 | 6.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows WLAN Auto Config Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38143 | 4.20 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows NT OS Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38135 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Network Address Translation (NAT):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38126 | 7.50 | Denial-of-Service |
| CVE-2024-38132 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Resource Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38136 | 7.00 | Verkrijgen van verhoogde rechten |
| CVE-2024-38137 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Common Log File System Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38196 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Transport Security Layer (TLS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38148 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Secure Kernel Mode:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-21302 | 6.70 | Verkrijgen van verhoogde rechten |
| CVE-2024-38142 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Reliable Multicast Transport Driver (RMCAST):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38140 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft Bluetooth Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38123 | 4.40 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38063 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Cloud Files Mini Filter Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38215 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows DWM Core Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38147 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38150 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Clipboard Virtual Channel Extension:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38131 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Network Virtualization:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38159 | 9.10 | Uitvoeren van willekeurige code |
| CVE-2024-38160 | 9.10 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Deployment Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38138 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Microsoft WDAC OLE DB provider for SQL:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38152 | 7.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Layer-2 Bridge Network Driver:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38145 | 7.50 | Denial-of-Service |
| CVE-2024-38146 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. Ook zijn mitigerende maatregelen gepubliceerd om de kans op misbruik te beperken voor die kwetsbaarheden waarvoor (nog) geen update beschikbaar is. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-138
Improper Neutralization of Special Elements
CWE-190
Integer Overflow or Wraparound
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-197
Numeric Truncation Error
CWE-20
Improper Input Validation
CWE-208
Observable Timing Discrepancy
CWE-284
Improper Access Control
CWE-306
Missing Authentication for Critical Function
CWE-345
Insufficient Verification of Data Authenticity
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-591
Sensitive Data Storage in Improperly Locked Memory
CWE-693
Protection Mechanism Failure
CWE-73
External Control of File Name or Path
CWE-787
Out-of-bounds Write
CWE-822
Untrusted Pointer Dereference
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
Use of Uninitialized Resource
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.", "title": "Feiten" }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service\n- Omzeilen van beveiligingsmaatregel\n- Manipuleren van gegevens\n- Verkrijgen van verhoogde rechten\n- Spoofing\n- Uitvoeren van willekeurige code (root/administrator rechten)\n- Uitvoeren van willekeurige code (Gebruikersrechten)\n- Toegang tot systeemgegevens\n\nVan de kwetsbaarheden met kenmerk CVE-2024-38106, CVE-2024-38107, CVE-2024-38178 en CVE-2024-38193 geeft Microsoft aan informatie te hebben dat deze actief zijn misbruikt.\n\nDe kwetsbaarheden met kenmerk CVE-2024-38106, CVE-2024-38107 en CVE-2024-38193 bevinden zich respectievelijk in de Kernel, de Power Dependency Co\u00f6rdinator en de Ancillary Function Driver for WinSock en stellen een lokale, geauthenticeerde kwaadwillende in staat om zich verhoogde rechten toe te kennen en code uit te voeren met SYSTEM rechten.\n\nDe kwetsbaarheid met kenmerk CVE-2024-38178 bevindt zich in de Scripting Engine en stelt een kwaadwillende in staat om willekeurige code uit te voeren met rechten van het slachtoffer. Succesvol misbruik vereist wel dat de kwaadwillende het slachtoffer misleidt om de Edge browser in \u0027Internet Explorer mode\u0027 laat draaien.\nVan de genoemde kwetsbaarheden is geen publieke Proof-of-Concept-code of exploit beschikbaar. Het vermoeden van het NCSC is echter dat deze wel op korte termijn publiek beschikbaar zal komen. Grootschalig actief misbruik is minder waarschijnlijk, vanwege de beperkende voorwaarden van misbruik.\n\nDe ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38063 toegewezen gekregen en bevindt zich in de wijze waarop Windows het IPv6 Protocol verwerkt. Een kwaadwillende kan zonder voorafgaande authenticatie op afstand willekeurige code uitvoeren op het kwetsbare systeem door het herhaaldelijk verzenden van speciaal geprepareerde IPv6 packets. IPv6 is standaard actief. Onderzoekers hebben Proof-of-Concept-code (PoC) gepubliceerd waarmee de kwetsbaarheid kan worden aangetoond. De PoC code vereist dat het doelwit onder controle is van de onderzoeker en veroorzaakt op dit moment hooguit een memory corruption wat resulteert in een crash van het systeem. Uitvoer van willekeurige code wordt niet bereikt. De kans op grootschalig misbruik wordt hiermee groter, maar door de beperkende voorwaarde om de PoC werkend te krijgen is deze PoC niet zondermeer grootschalig op internet in te zetten. Microsoft is niet op de hoogte dat de kwetsbaarheid actief wordt misbruikt. Microsoft adviseert om als mitigerende maatregel IPv6 uit te schakelen indien dit niet strikt noodzakelijk is.\n\nDe kwetsbaarheden met kenmerk CVE-2024-21302 en CVE-2024-38202 zijn op de laatste BlackHat Conference gepubliceerd door de onderzoeker die ze ontdekt heeft. Deze kwetsbaarheden worden in de gegevens van deze maandelijkse update wel genoemd, maar in deze update worden ze niet verholpen.\nMicrosoft geeft aan nog aan een oplossing te werken en heeft wel mitigerende maatregelen gepubliceerd, om de dreiging van misbruik zo goed als mogelijk te beperken. Zie hiervoor de referenties naar de specifieke kwetsbaarheid.\n\nDe kwetsbaarheden stellen een kwaadwillende in staat om een roll-back uit te voeren van ge\u00efnstalleerde updates en zo het systeem weer kwetsbaar te maken voor oudere kwetsbaarheden, zonder dat dit ontdekt kan worden door het systeem. Voor het slachtoffer blijft het systeem voldoen aan de laatste beveiligingsupdates.\nSuccesvol misbruik is niet eenvoudig en vereist dat de kwaadwillende over verhoogde rechten beschikt op het kwetsbare systeem. Actief misbruik zal dus vermoedelijk een volgende stap in een keten zijn door een kwaadwillende die op andere wijze toegang heeft gekregen tot het kwetsbare systeem en deze kwetsbaarheden gebruikt om permanente toegang te garanderen.\n\n\n```\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38213 | 6.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Compressed Folder: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38165 | 6.50 | Manipuleren van gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Update Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38163 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38202 | 7.30 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows DNS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37968 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38161 | 6.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38193 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38141 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows IP Routing Management Snapin: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38114 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38115 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38116 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38106 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38127 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38133 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38151 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38153 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2022-2601 | 8.60 | Omzeilen van beveiligingsmaatregel | \n| CVE-2023-40547 | 8.30 | Omzeilen van beveiligingsmaatregel | \n| CVE-2022-3775 | 7.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38184 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38191 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38185 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38186 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38187 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Print Spooler Components: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38198 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Power Dependency Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38107 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows SmartScreen: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38180 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Initial Machine Configuration: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38223 | 6.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38199 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38125 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38134 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38144 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-29995 | 8.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Security Center: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38155 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Scripting: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38178 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Local Security Authority Server (lsasrv): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38118 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38122 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38117 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38121 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38128 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38130 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38154 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38120 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38214 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows WLAN Auto Config Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38143 | 4.20 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows NT OS Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38135 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Network Address Translation (NAT): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38126 | 7.50 | Denial-of-Service | \n| CVE-2024-38132 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Resource Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38136 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38137 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38196 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Transport Security Layer (TLS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38148 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Secure Kernel Mode: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21302 | 6.70 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38142 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nReliable Multicast Transport Driver (RMCAST): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38140 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft Bluetooth Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38123 | 4.40 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38063 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Cloud Files Mini Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38215 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38147 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38150 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Clipboard Virtual Channel Extension: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38131 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Network Virtualization: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38159 | 9.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38160 | 9.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Deployment Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38138 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft WDAC OLE DB provider for SQL: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38152 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Layer-2 Bridge Network Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38145 | 7.50 | Denial-of-Service | \n| CVE-2024-38146 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. Ook zijn mitigerende maatregelen gepubliceerd om de kans op misbruik te beperken voor die kwetsbaarheden waarvoor (nog) geen update beschikbaar is. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Neutralization of Special Elements", "title": "CWE-138" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202" } ], "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2024-08-27T07:59:08.391850Z", "id": "NCSC-2024-0334", "initial_release_date": "2024-08-13T18:19:27.728322Z", "revision_history": [ { "date": "2024-08-13T18:19:27.728322Z", "number": "0", "summary": "Initiele versie" }, { "date": "2024-08-27T07:59:08.391850Z", "number": "1", "summary": "Er is Proof-of-Concept-code (PoC) verschenen voor de kwetsbaarheid met kenmerk CVE-2024-38063" } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "remote_desktop_client_for_windows_desktop", "product": { "name": "remote_desktop_client_for_windows_desktop", "product_id": "CSAFPID-1455711", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:remote_desktop_client_for_windows_desktop:1.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1453769", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1574686", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1607", "product": { "name": "windows_10_version_1607", "product_id": "CSAFPID-1453770", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1607:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1607", "product": { "name": "windows_10_version_1607", "product_id": "CSAFPID-1574687", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1607:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1809", "product": { "name": "windows_10_version_1809", "product_id": "CSAFPID-1453758", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1809:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_1809", "product": { "name": "windows_10_version_1809", "product_id": "CSAFPID-1455810", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1809:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_21h2", "product": { "name": "windows_10_version_21h2", "product_id": "CSAFPID-1453800", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_21h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_21h2", "product": { "name": "windows_10_version_21h2", "product_id": "CSAFPID-1610391", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_21h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_22h2", "product": { "name": "windows_10_version_22h2", "product_id": "CSAFPID-1453802", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_22h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_version_22h2", "product": { "name": "windows_10_version_22h2", "product_id": "CSAFPID-1610393", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_22h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_21h2", "product": { "name": "windows_11_version_21h2", "product_id": "CSAFPID-1453799", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_21h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_21h2", "product": { "name": "windows_11_version_21h2", "product_id": "CSAFPID-1610390", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_21h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_22h2", "product": { "name": "windows_11_version_22h2", "product_id": "CSAFPID-1453801", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_22h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_22h2", "product": { "name": "windows_11_version_22h2", "product_id": "CSAFPID-1610392", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_22h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_22h3", "product": { "name": "windows_11_version_22h3", "product_id": "CSAFPID-1453803", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_22h3:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_22h3", "product": { "name": "windows_11_version_22h3", "product_id": "CSAFPID-1610394", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_22h3:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_23h2", "product": { "name": "windows_11_version_23h2", "product_id": "CSAFPID-1453804", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_23h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_23h2", "product": { "name": "windows_11_version_23h2", "product_id": "CSAFPID-1610395", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_23h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_24h2", "product": { "name": "windows_11_version_24h2", "product_id": "CSAFPID-1615902", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_24h2:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11_version_24h2", "product": { "name": "windows_11_version_24h2", "product_id": "CSAFPID-1610396", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_11_version_24h2:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2008__service_pack_2", "product": { "name": "windows_server_2008__service_pack_2", "product_id": "CSAFPID-1453778", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2008_r2_service_pack_1__server_core_installation_", "product": { "name": "windows_server_2008_r2_service_pack_1__server_core_installation_", "product_id": "CSAFPID-1453780", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1__server_core_installation_:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2008_r2_service_pack_1", "product": { "name": "windows_server_2008_r2_service_pack_1", "product_id": "CSAFPID-1453779", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:6.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2008_service_pack_2__server_core_installation_", "product": { "name": "windows_server_2008_service_pack_2__server_core_installation_", "product_id": "CSAFPID-1453777", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2__server_core_installation_:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2008_service_pack_2", "product": { "name": "windows_server_2008_service_pack_2", "product_id": "CSAFPID-1453776", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2012__server_core_installation_", "product": { "name": "windows_server_2012__server_core_installation_", "product_id": "CSAFPID-1453782", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2012__server_core_installation_:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2012_r2__server_core_installation_", "product": { "name": "windows_server_2012_r2__server_core_installation_", "product_id": "CSAFPID-1453784", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2__server_core_installation_:6.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2012_r2", "product": { "name": "windows_server_2012_r2", "product_id": "CSAFPID-1453783", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2:6.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2012", "product": { "name": "windows_server_2012", "product_id": "CSAFPID-1453781", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2012:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016__server_core_installation_", "product": { "name": "windows_server_2016__server_core_installation_", "product_id": "CSAFPID-1453772", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016__server_core_installation_", "product": { "name": "windows_server_2016__server_core_installation_", "product_id": "CSAFPID-1457438", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016", "product": { "name": "windows_server_2016", "product_id": "CSAFPID-1453771", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016", "product": { "name": "windows_server_2016", "product_id": "CSAFPID-1457437", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2016:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019__server_core_installation_", "product": { "name": "windows_server_2019__server_core_installation_", "product_id": "CSAFPID-1453760", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019__server_core_installation_", "product": { "name": "windows_server_2019__server_core_installation_", "product_id": "CSAFPID-1457435", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019", "product": { "name": "windows_server_2019", "product_id": "CSAFPID-1453759", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019", "product": { "name": "windows_server_2019", "product_id": "CSAFPID-1457434", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2019:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022__23h2_edition__server_core_installation_", "product": { "name": "windows_server_2022__23h2_edition__server_core_installation_", "product_id": "CSAFPID-1453805", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022__23h2_edition__server_core_installation_", "product": { "name": "windows_server_2022__23h2_edition__server_core_installation_", "product_id": "CSAFPID-1455588", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022", "product": { "name": "windows_server_2022", "product_id": "CSAFPID-1453798", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2022:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022", "product": { "name": "windows_server_2022", "product_id": "CSAFPID-1457436", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_server_2022:n_a:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_for_32-bit_systems", "product": { "name": "windows_10_for_32-bit_systems", "product_id": "CSAFPID-1502044", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_for_32-bit_systems:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10_for_64-based_systems", "product": { "name": "windows_10_for_64-based_systems", "product_id": "CSAFPID-1502062", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10_for_64-based_systems:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-2507", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502046", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1607_for_32-bit_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502058", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1607_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-2482", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502053", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1809_for_32-bit_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502047", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1809_for_arm64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502040", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1809_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-2483", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502051", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:21h2_for_32-bit_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502043", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:21h2_for_arm64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502061", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:21h2_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-2481", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502041", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:22h2_for_32-bit_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502057", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:22h2_for_arm64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-1502060", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:22h2_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_10", "product": { "name": "windows_10", "product_id": "CSAFPID-3823", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502050", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:21h2_for_arm64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502059", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:21h2_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-168717", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502039", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:22h2_for_arm64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502056", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:22h2_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-168718", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502045", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:23h2_for_arm64-based_system:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1502055", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:23h2_for_x64-based_systems:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-804567", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:23h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1614511", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:24h2_for_arm64-based_system:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1614512", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:24h2_for_x64-based_system:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_11", "product": { "name": "windows_11", "product_id": "CSAFPID-1610036", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_11:24h2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016", "product": { "name": "windows_server_2016", "product_id": "CSAFPID-2417", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2016", "product": { "name": "windows_server_2016", "product_id": "CSAFPID-168719", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019", "product": { "name": "windows_server_2019", "product_id": "CSAFPID-2414", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2019", "product": { "name": "windows_server_2019", "product_id": "CSAFPID-75346", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022_23h2", "product": { "name": "windows_server_2022_23h2", "product_id": "CSAFPID-747000", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022", "product": { "name": "windows_server_2022", "product_id": "CSAFPID-2488", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022", "product": { "name": "windows_server_2022", "product_id": "CSAFPID-75345", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows_server_2022", "product": { "name": "windows_server_2022", "product_id": "CSAFPID-1502048", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows_server_2022:23h2_edition:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "windows", "product": { "name": "windows", "product_id": "CSAFPID-289704", "product_identification_helper": { "cpe": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1502048" ] } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2024-38161", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1502048", "CSAFPID-75346", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-2481", "CSAFPID-2483" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1502048", "CSAFPID-75346", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-2481", "CSAFPID-2483" ] } ], "title": "CVE-2024-38161" }, { "cve": "CVE-2024-38178", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2488" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38178.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2488" ] } ], "title": "CVE-2024-38178" }, { "cve": "CVE-2024-38184", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38184" }, { "cve": "CVE-2024-38191", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38191" }, { "cve": "CVE-2024-38193", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2488", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38193", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38193.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2488", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-747000" ] } ], "title": "CVE-2024-38193" }, { "cve": "CVE-2024-38196", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38196.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38196" }, { "cve": "CVE-2024-38198", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38198" }, { "cve": "CVE-2024-38199", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38199", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38199.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38199" }, { "cve": "CVE-2024-38213", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-2417", "CSAFPID-2488", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38213", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38213.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-2417", "CSAFPID-2488", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-747000" ] } ], "title": "CVE-2024-38213" }, { "cve": "CVE-2024-21302", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2488", "CSAFPID-1502048", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-289704", "CSAFPID-1455810", "CSAFPID-1457434", "CSAFPID-1457435", "CSAFPID-1457436", "CSAFPID-1610390", "CSAFPID-1610391", "CSAFPID-1610392", "CSAFPID-1610393", "CSAFPID-1610394", "CSAFPID-1610395", "CSAFPID-1455588", "CSAFPID-1610396", "CSAFPID-1574686", "CSAFPID-1574687", "CSAFPID-1457437", "CSAFPID-1457438" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21302", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21302.json" } ], "title": "CVE-2024-21302" }, { "cve": "CVE-2023-40547", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2023-40547", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40547.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1502048" ] } ], "title": "CVE-2023-40547" }, { "cve": "CVE-2024-38063", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38063", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38063.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38063" }, { "cve": "CVE-2024-38106", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1615902", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-2488", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38106", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38106.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1615902", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-2488", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38106" }, { "cve": "CVE-2024-38107", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-2488", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38107", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38107.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-2488", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38107" }, { "cve": "CVE-2024-29995", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453800", "CSAFPID-1453802", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29995", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29995.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453800", "CSAFPID-1453802", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345" ] } ], "title": "CVE-2024-29995" }, { "cve": "CVE-2024-38114", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38114", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38114.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38114" }, { "cve": "CVE-2024-38115", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38115", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38115.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38115" }, { "cve": "CVE-2024-38116", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38116", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38116.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38116" }, { "cve": "CVE-2024-38117", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38117", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38117.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38117" }, { "cve": "CVE-2024-38118", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38118", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38118.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38118" }, { "cve": "CVE-2024-38122", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38122", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38122.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38122" }, { "cve": "CVE-2024-38125", "cwe": { "id": "CWE-197", "name": "Numeric Truncation Error" }, "notes": [ { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38125", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38125.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38125" }, { "cve": "CVE-2024-38126", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38126.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38126" }, { "cve": "CVE-2024-38130", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38130" }, { "cve": "CVE-2024-38131", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1455711", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1455711", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38131" }, { "cve": "CVE-2024-38132", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38132", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38132.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38132" }, { "cve": "CVE-2024-38133", "cwe": { "id": "CWE-138", "name": "Improper Neutralization of Special Elements" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements", "title": "CWE-138" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-2481", "CSAFPID-2483" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-2481", "CSAFPID-2483" ] } ], "title": "CVE-2024-38133" }, { "cve": "CVE-2024-38134", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38134", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38134.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38134" }, { "cve": "CVE-2024-38136", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2483", "CSAFPID-1502048", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38136.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2414", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2483", "CSAFPID-1502048", "CSAFPID-75346" ] } ], "title": "CVE-2024-38136" }, { "cve": "CVE-2024-38140", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38140.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38140" }, { "cve": "CVE-2024-38141", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38141", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38141.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38141" }, { "cve": "CVE-2024-38142", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38142", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38142.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38142" }, { "cve": "CVE-2024-38143", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38143.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38143" }, { "cve": "CVE-2024-38144", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38144.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38144" }, { "cve": "CVE-2024-38145", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38145.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38145" }, { "cve": "CVE-2024-38146", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38146", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38146.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38146" }, { "cve": "CVE-2024-38151", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38151", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38151.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481", "CSAFPID-2482" ] } ], "title": "CVE-2024-38151" }, { "cve": "CVE-2024-38152", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38152", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38152.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38152" }, { "cve": "CVE-2024-38153", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38153", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38153.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38153" }, { "cve": "CVE-2024-38155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1615902", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38155", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38155.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1615902", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38155" }, { "cve": "CVE-2024-38180", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38180.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38180" }, { "cve": "CVE-2024-38185", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38185", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38185.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38185" }, { "cve": "CVE-2024-38186", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38186", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38186.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38186" }, { "cve": "CVE-2024-38187", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38187" }, { "cve": "CVE-2022-3775", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2022-3775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1502048" ] } ], "title": "CVE-2022-3775" }, { "cve": "CVE-2024-38215", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38215.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38215" }, { "cve": "CVE-2024-38202", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-289704", "CSAFPID-1455810", "CSAFPID-1457434", "CSAFPID-1457435", "CSAFPID-1457436", "CSAFPID-1610390", "CSAFPID-1610391", "CSAFPID-1610392", "CSAFPID-1610393", "CSAFPID-1610394", "CSAFPID-1610395", "CSAFPID-1455588", "CSAFPID-1574687", "CSAFPID-1457437", "CSAFPID-1457438", "CSAFPID-2488", "CSAFPID-2414", "CSAFPID-2417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38202.json" } ], "title": "CVE-2024-38202" }, { "cve": "CVE-2024-38223", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38223", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38223.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-2507", "CSAFPID-2481", "CSAFPID-3823", "CSAFPID-2482", "CSAFPID-2483", "CSAFPID-168718", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38223" }, { "cve": "CVE-2024-38127", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453758", "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1453769", "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-2483", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481", "CSAFPID-2482", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38127" }, { "cve": "CVE-2024-38121", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38121", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38121.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38121" }, { "cve": "CVE-2024-38128", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38128.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38128" }, { "cve": "CVE-2024-38138", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-747000", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38138.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-747000", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38138" }, { "cve": "CVE-2024-38154", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38154", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38154.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-38154" }, { "cve": "CVE-2024-38120", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38120", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38120.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000" ] } ], "title": "CVE-2024-38120" }, { "cve": "CVE-2024-38214", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38214", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38214.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-168719", "CSAFPID-75346", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38214" }, { "cve": "CVE-2024-37968", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37968", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37968.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453759", "CSAFPID-1453760", "CSAFPID-1453798", "CSAFPID-1453805", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1453776", "CSAFPID-1453777", "CSAFPID-1453778", "CSAFPID-1453779", "CSAFPID-1453780", "CSAFPID-1453781", "CSAFPID-1453782", "CSAFPID-1453783", "CSAFPID-1453784", "CSAFPID-747000", "CSAFPID-2507", "CSAFPID-2414", "CSAFPID-2417", "CSAFPID-75345", "CSAFPID-1502048", "CSAFPID-168719", "CSAFPID-75346" ] } ], "title": "CVE-2024-37968" }, { "cve": "CVE-2024-38137", "cwe": { "id": "CWE-591", "name": "Sensitive Data Storage in Improperly Locked Memory" }, "notes": [ { "category": "other", "text": "Sensitive Data Storage in Improperly Locked Memory", "title": "CWE-591" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-75345", "CSAFPID-2481" ] } ], "title": "CVE-2024-38137" }, { "cve": "CVE-2024-38147", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481" ] } ], "title": "CVE-2024-38147" }, { "cve": "CVE-2024-38148", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38148", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38148.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718" ] } ], "title": "CVE-2024-38148" }, { "cve": "CVE-2024-38150", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38150", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38150.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453798", "CSAFPID-1453799", "CSAFPID-1453800", "CSAFPID-1453801", "CSAFPID-1453802", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1615902", "CSAFPID-1502048", "CSAFPID-75345", "CSAFPID-747000", "CSAFPID-168718", "CSAFPID-3823", "CSAFPID-2481" ] } ], "title": "CVE-2024-38150" }, { "cve": "CVE-2024-38135", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-168718" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1453805", "CSAFPID-1502048", "CSAFPID-747000", "CSAFPID-168718" ] } ], "title": "CVE-2024-38135" }, { "cve": "CVE-2024-38165", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38165.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453801", "CSAFPID-1453803", "CSAFPID-1453804", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38165" }, { "cve": "CVE-2024-38159", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1502048", "CSAFPID-2417", "CSAFPID-2482", "CSAFPID-168719" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38159", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38159.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1502048", "CSAFPID-2417", "CSAFPID-2482", "CSAFPID-168719" ] } ], "title": "CVE-2024-38159" }, { "cve": "CVE-2024-38160", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1502048", "CSAFPID-168719" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38160.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453770", "CSAFPID-1453771", "CSAFPID-1453772", "CSAFPID-1502048", "CSAFPID-168719" ] } ], "title": "CVE-2024-38160" }, { "cve": "CVE-2024-38123", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1615902", "CSAFPID-1502048" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38123", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38123.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1615902", "CSAFPID-1502048" ] } ], "title": "CVE-2024-38123" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.