Access Restriction Bypass Affecting grub2 package, versions [1.98,2.02]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GRUB2-2368577
  • published26 Jan 2022
  • disclosed16 Dec 2015
  • creditUnknown

Introduced: 16 Dec 2015

CVE-2015-8370  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

There is no fixed version for grub2.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

References

CVSS Scores

version 3.1