发布时间: 2024年2月2日
修改时间: 2024年10月31日
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Adjacent | Adjacent |
CVSS评分 | 8.3 | 8.3 |
Attack Complexity | High | High |
Privileges Required | None | None |
Scope | Changed | Changed |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1079 | shim security update | 2024年2月2日 |
KylinSec-SA-2024-1080 | shim security update | 2024年2月2日 |
KylinSec-SA-2024-1081 | shim security update | 2024年2月2日 |
KylinSec-SA-2024-1252 | shim security update | 2024年2月2日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | shim | Fixed |
KY3.4-5A | shim | Fixed |
KY3.5.1 | shim | Fixed |
KY3.5.2 | shim | Fixed |