Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8370

Опубликовано: 16 дек. 2015
Источник: debian
EPSS Низкий

Описание

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
grub2fixed2.02~beta2-33package

Примечания

  • https://twitter.com/lostinsecurity/status/674925944524640257

  • http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

EPSS

Процентиль: 86%
0.02876
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

redhat
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

CVSS3: 7.4
nvd
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

msrc
почти 5 лет назад

Описание отсутствует

suse-cvrf
больше 9 лет назад

Security update for grub2

EPSS

Процентиль: 86%
0.02876
Низкий