SB20240709127 - Multiple vulnerabilities in Microsoft Secure Boot
Published: July 9, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 20 secuirty vulnerabilities.
1) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-38010)
The vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
2) Heap-based buffer overflow (CVE-ID: CVE-2024-38065)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot
3) Stack-based buffer overflow (CVE-ID: CVE-2024-37971)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
4) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-38011)
The vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
5) Stack-based buffer overflow (CVE-ID: CVE-2024-37978)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
6) Heap-based buffer overflow (CVE-ID: CVE-2024-37977)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot
7) Stack-based buffer overflow (CVE-ID: CVE-2024-37972)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
8) Stack-based buffer overflow (CVE-ID: CVE-2024-37984)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A local attacker can trigger stack-based buffer overflow and bypass Secure Boot.
9) Untrusted Pointer Dereference (CVE-ID: CVE-2024-37969)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to untrusted pointer dereference in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
10) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-37988)
The vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
11) Stack-based buffer overflow (CVE-ID: CVE-2024-28899)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
12) Type Confusion (CVE-ID: CVE-2024-37987)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a type confusion error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a type confusion error and bypass Secure Boot.
13) Integer underflow (CVE-ID: CVE-2024-37974)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
14) Stack-based buffer overflow (CVE-ID: CVE-2024-37970)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
15) Integer underflow (CVE-ID: CVE-2024-37986)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
16) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-37989)
The vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
17) Integer underflow (CVE-ID: CVE-2024-37975)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
18) Uncontrolled Recursion (CVE-ID: CVE-2024-37973)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to infinite recursion in Secure Boot. A local attacker can pass specially crafted input to the application and bypass Secure Boot.
19) Integer overflow (CVE-ID: CVE-2024-26184)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer overflow in Secure Boot. A remote user on the local network can pass specially crafted data to the application, trigger integer overflow and bypass Secure Boot.
20) Integer underflow (CVE-ID: CVE-2024-37981)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
Remediation
Install update from vendor's website.
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981