Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-27749

Опубликовано: 02 мар. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

A flaw was found in grub2. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7fwupdAffected
Red Hat Enterprise Linux 7fwupdateAffected
Red Hat Enterprise Linux 7shimNot affected
Red Hat Enterprise Linux 7grub2FixedRHSA-2021:069902.03.2021
Red Hat Enterprise Linux 7.2 Advanced Update Supportgrub2FixedRHSA-2021:070402.03.2021
Red Hat Enterprise Linux 7.3 Advanced Update Supportgrub2FixedRHSA-2021:070302.03.2021
Red Hat Enterprise Linux 7.4 Advanced Update Supportgrub2FixedRHSA-2021:070202.03.2021
Red Hat Enterprise Linux 7.4 Telco Extended Update Supportgrub2FixedRHSA-2021:070202.03.2021
Red Hat Enterprise Linux 7.4 Update Services for SAP Solutionsgrub2FixedRHSA-2021:070202.03.2021
Red Hat Enterprise Linux 7.6 Extended Update Supportgrub2FixedRHSA-2021:070102.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1899966grub2: Stack buffer overflow in grub_parser_split_cmdline()

EPSS

Процентиль: 20%
0.00064
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
nvd
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.7
debian
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names pr ...

CVSS3: 6.7
github
около 3 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

EPSS

Процентиль: 20%
0.00064
Низкий

7.5 High

CVSS3