Vulnerabilities
Vulnerable Software
Redhat:  >> Shim  >> 15.8  Security Vulnerabilities
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
CVSS Score
7.4
EPSS Score
0.0
Published
2024-01-29


Contact Us

Shodan ® - All rights reserved