Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8370

Опубликовано: 10 дек. 2015
Источник: redhat
CVSS2: 6.9

Описание

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

A flaw was found in the way grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5grubNot affected
Red Hat Enterprise Linux 6grubNot affected
Red Hat Enterprise Linux 8grub2Not affected
Red Hat Enterprise Linux 7grub2FixedRHSA-2015:262315.12.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1286966grub2: buffer overflow when checking password entered during bootup

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

CVSS3: 7.4
nvd
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.4
debian
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physicall ...

suse-cvrf
больше 9 лет назад

Security update for grub2

6.9 Medium

CVSS2