Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-27749

Опубликовано: 03 мар. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 6.7

Описание

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

does not affect Secure Boot
esm-infra-legacy/trusty

not-affected

does not affect Secure Boot
esm-infra/bionic

not-affected

does not affect Secure Boot
esm-infra/focal

not-affected

does not affect Secure Boot
esm-infra/xenial

not-affected

does not affect Secure Boot
focal

not-affected

does not affect Secure Boot
jammy

not-affected

does not affect Secure Boot
kinetic

not-affected

does not affect Secure Boot
lunar

not-affected

does not affect Secure Boot

Показывать по

РелизСтатусПримечание
bionic

released

1.167~18.04.5
devel

not-affected

1.193
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

1.167~18.04.5
esm-infra/focal

not-affected

1.167.2
esm-infra/xenial

not-affected

1.164
focal

released

1.167.2
groovy

released

1.167.2
hirsute

released

1.164
impish

released

1.169

Показывать по

РелизСтатусПримечание
bionic

released

2.04-1ubuntu44.1.2
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.04-1ubuntu44.1.2
esm-infra/focal

not-affected

2.04-1ubuntu44.2
esm-infra/xenial

not-affected

2.04-1ubuntu42
focal

released

2.04-1ubuntu44.2
groovy

released

2.04-1ubuntu44.2
hirsute

released

2.04-1ubuntu42
impish

released

2.04-1ubuntu45

Показывать по

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
nvd
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.7
debian
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names pr ...

CVSS3: 6.7
github
около 3 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

EPSS

Процентиль: 20%
0.00064
Низкий

7.2 High

CVSS2

6.7 Medium

CVSS3