{"id":"AZL-34030","summary":"CVE-2023-40547 affecting package shim for versions less than 15.8-1","details":"A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.","modified":"2026-04-01T05:11:20.459659Z","published":"2024-01-25T16:15:07Z","upstream":["CVE-2023-40547"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40547"}],"affected":[{"package":{"name":"shim","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/shim"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.8-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-34030.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}