Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-0690

Опубликовано: 24 фев. 2025
Источник: nvd
CVSS3: 6.1
EPSS Низкий

Описание

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

EPSS

Процентиль: 24%
0.00079
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.1
ubuntu
8 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
redhat
9 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
msrc
2 месяца назад

Grub2: read: integer overflow may lead to out-of-bounds write

CVSS3: 6.1
debian
8 месяцев назад

The read command is used to read the keyboard input from the user, whi ...

CVSS3: 6.1
github
8 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

EPSS

Процентиль: 24%
0.00079
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-787