Логотип exploitDog
bind:"GHSA-258p-xh3c-g68w" OR bind:"CVE-2020-27749"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-258p-xh3c-g68w" OR bind:"CVE-2020-27749"

Количество 24

Количество 24

github логотип

GHSA-258p-xh3c-g68w

почти 4 года назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
EPSS: Низкий
ubuntu логотип

CVE-2020-27749

около 5 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2020-27749

около 5 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-27749

около 5 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2020-27749

около 5 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents using a 1kB stack buffer for temporary storage without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload it is possible to overflow the stack buffer corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
EPSS: Низкий
debian логотип

CVE-2020-27749

около 5 лет назад

A flaw was found in grub2 in versions prior to 2.06. Variable names pr ...

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2022-00338

больше 5 лет назад

Уязвимость реализации функций загрузчика операционных систем Grub2, позволяющая нарушителю получить доступ к конфиденциальным данным, оказать влияние на целостность данных, а также вызвать отказ в обслуживании

CVSS3: 6.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0462-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0685-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0684-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0683-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0682-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0681-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0679-1

около 5 лет назад

Security update for grub2

EPSS: Низкий
rocky логотип

RLSA-2021:2566

почти 5 лет назад

Moderate: fwupd security update

EPSS: Низкий
rocky логотип

RLSA-2021:1734

почти 5 лет назад

Moderate: shim security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9077

около 5 лет назад

ELSA-2021-9077: grub2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9076

около 5 лет назад

ELSA-2021-9076: grub2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2566

почти 5 лет назад

ELSA-2021-2566: fwupd security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-0699

около 5 лет назад

ELSA-2021-0699: grub2 security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-258p-xh3c-g68w

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2020-27749

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-27749

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.5
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-27749

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
0%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-27749

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents using a 1kB stack buffer for temporary storage without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload it is possible to overflow the stack buffer corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 6.7
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-27749

A flaw was found in grub2 in versions prior to 2.06. Variable names pr ...

CVSS3: 6.7
0%
Низкий
около 5 лет назад
fstec логотип
BDU:2022-00338

Уязвимость реализации функций загрузчика операционных систем Grub2, позволяющая нарушителю получить доступ к конфиденциальным данным, оказать влияние на целостность данных, а также вызвать отказ в обслуживании

CVSS3: 6.7
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0462-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0685-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0684-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0683-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0682-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0681-1

Security update for grub2

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0679-1

Security update for grub2

около 5 лет назад
rocky логотип
RLSA-2021:2566

Moderate: fwupd security update

почти 5 лет назад
rocky логотип
RLSA-2021:1734

Moderate: shim security update

почти 5 лет назад
oracle-oval логотип
ELSA-2021-9077

ELSA-2021-9077: grub2 security update (IMPORTANT)

около 5 лет назад
oracle-oval логотип
ELSA-2021-9076

ELSA-2021-9076: grub2 security update (IMPORTANT)

около 5 лет назад
oracle-oval логотип
ELSA-2021-2566

ELSA-2021-2566: fwupd security update (MODERATE)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-0699

ELSA-2021-0699: grub2 security update (MODERATE)

около 5 лет назад

Уязвимостей на страницу