There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-10-22T13:17:50.789Z

Reserved: 2022-04-05T21:59:08.761Z

Link: CVE-2022-28737

cve-icon Vulnrichment

Updated: 2024-08-03T06:03:52.700Z

cve-icon NVD

Status : Modified

Published: 2023-07-20T01:15:10.473

Modified: 2024-11-21T06:57:50.197

Link: CVE-2022-28737

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-06-07T17:00:00Z

Links: CVE-2022-28737 - Bugzilla

cve-icon OpenCVE Enrichment

No data.