Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-28737

Опубликовано: 07 июн. 2022
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.

A flaw was found in shim during the handling of EFI executables. A crafted EFI image can lead to an overflow in shim. This flaw allows an attacker to perform an out-of-bounds write in memory. A successful attack can lead to data integrity, confidentiality issues, and arbitrary code execution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7shimAffected
Red Hat Enterprise Linux 8shimFixedRHSA-2022:509516.06.2022
Red Hat Enterprise Linux 8shim-unsigned-x64FixedRHSA-2022:509516.06.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsshimFixedRHSA-2022:509816.06.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportshimFixedRHSA-2022:510016.06.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportshim-unsigned-x64FixedRHSA-2022:510016.06.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportshimFixedRHSA-2022:509616.06.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportshim-unsigned-x64FixedRHSA-2022:509616.06.2022
Red Hat Enterprise Linux 9shimFixedRHSA-2022:509916.06.2022
Red Hat Enterprise Linux 9shim-unsigned-x64FixedRHSA-2022:509916.06.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2090899shim: Buffer overflow when loading crafted EFI images

EPSS

Процентиль: 4%
0.00021
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.

CVSS3: 6.5
nvd
почти 2 года назад

There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.

CVSS3: 7.8
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 6.5
debian
почти 2 года назад

There's a possible overflow in handle_image() when shim tries to load ...

suse-cvrf
около 2 лет назад

Security update for shim

EPSS

Процентиль: 4%
0.00021
Низкий

7.3 High

CVSS3