Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-10713

Опубликовано: 30 июл. 2020
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 4.6
CVSS3: 8.2

Описание

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

РелизСтатусПримечание
bionic

released

2.02-2ubuntu8.16
devel

not-affected

2.06-2ubuntu18
eoan

ignored

end of life
esm-infra-legacy/trusty

released

2.02~beta2-9ubuntu1.20
esm-infra/bionic

released

2.02-2ubuntu8.16
esm-infra/focal

released

2.04-1ubuntu26.1
esm-infra/xenial

released

2.02~beta2-36ubuntu3.26
focal

released

2.04-1ubuntu26.1
groovy

not-affected

2.04-1ubuntu26.1
hirsute

not-affected

2.04-1ubuntu26.1

Показывать по

РелизСтатусПримечание
bionic

released

1.93.18
devel

not-affected

1.193
eoan

ignored

end of life
esm-infra-legacy/trusty

released

1.34.22
esm-infra/bionic

released

1.93.18
esm-infra/focal

released

1.142.3
esm-infra/xenial

released

1.66.26
focal

released

1.142.3
groovy

not-affected

1.147
hirsute

not-affected

1.147

Показывать по

РелизСтатусПримечание
bionic

released

2.04-1ubuntu47.4
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.04-1ubuntu47.4
esm-infra/focal

released

2.04-1ubuntu47.4
esm-infra/xenial

needed

focal

released

2.04-1ubuntu47.4
jammy

not-affected

2.06-2ubuntu7
kinetic

not-affected

2.06-2ubuntu12
lunar

not-affected

2.06-2ubuntu16

Показывать по

EPSS

Процентиль: 49%
0.00259
Низкий

4.6 Medium

CVSS2

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
больше 5 лет назад

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.2
nvd
больше 5 лет назад

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.2
msrc
около 5 лет назад

A flaw was found in grub2 prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel an attacker would first need to establish access to the system such as gaining physical access obtain the ability to alter a pxe-boot network or have remote access to a networked system with root access. With this access an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.2
debian
больше 5 лет назад

A flaw was found in grub2, prior to version 2.06. An attacker may use ...

suse-cvrf
около 5 лет назад

Security update for shim

EPSS

Процентиль: 49%
0.00259
Низкий

4.6 Medium

CVSS2

8.2 High

CVSS3

Уязвимость CVE-2020-10713