Description
There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33176 | There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario. |
Ubuntu USN |
USN-6355-1 | GRUB2 vulnerabilities |
References
History
Tue, 22 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-10-22T13:17:50.789Z
Reserved: 2022-04-05T21:59:08.761Z
Link: CVE-2022-28737
Updated: 2024-08-03T06:03:52.700Z
Status : Modified
Published: 2023-07-20T01:15:10.473
Modified: 2024-11-21T06:57:50.197
Link: CVE-2022-28737
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN