Advisory 2024-0279 - Linux "Shim": Vulnerability allows complete control
Date
2024-02-09
State
2024-10-10
Risk*
Damage: HIGH
Attack Probability: MEDIUM
Attack
An anonymous attacker from the adjacent network can exploit a vulnerability in the "Shim" component of the Linux systems to take control of an affected system.
* The probability of an attack is determined by the attacker's motivation, the necessary expend and the possibilities for an attack. The damage probability is determined by the expend needed to resolute the attack and probable indirecte consequences of an attack for business processes. Telekom Security assumes worst case scenarios.
Copyright © 1999-2024 Deutsche Telekom Security GmbH. All rights reserved. Reproduction and distribution of this publication in any form - even in parts - without prior written permission is forbidden.
The information contained herein has been obtained from sources believed to be reliable and trusted or have been verified. Telekom Security can take liability for completeness, accuracy and correctness only in so far, as gross negligence or intention create liability. Any liability beyond it, in particular possible damages resulting from using or non-usability of the information contained herein, is excluded.