Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8370

Опубликовано: 10 дек. 2015
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

A flaw was found in the way grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5grubNot affected
Red Hat Enterprise Linux 6grubNot affected
Red Hat Enterprise Linux 8grub2Not affected
Red Hat Enterprise Linux 7grub2FixedRHSA-2015:262315.12.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1286966grub2: buffer overflow when checking password entered during bootup

EPSS

Процентиль: 86%
0.03054
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 10 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

CVSS3: 7.4
nvd
почти 10 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7.4
debian
почти 10 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physicall ...

suse-cvrf
почти 10 лет назад

Security update for grub2

EPSS

Процентиль: 86%
0.03054
Низкий

6.9 Medium

CVSS2