Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9fg2-2f57-9p5h

Опубликовано: 24 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.1

Описание

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

EPSS

Процентиль: 9%
0.00036
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.1
ubuntu
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
redhat
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
nvd
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
debian
6 месяцев назад

The read command is used to read the keyboard input from the user, whi ...

CVSS3: 7.8
fstec
6 месяцев назад

Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 9%
0.00036
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-787