First published: Tue Dec 01 2009(Updated: )
GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Grub 2 | =1.97 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4128 has a medium severity level due to its potential for brute force attacks on authentication.
To fix CVE-2009-4128, upgrade to a patched version of GNU GRUB that addresses the password handling vulnerabilities.
CVE-2009-4128 specifically affects GNU GRUB 2 version 1.97.
CVE-2009-4128 can be exploited by physical attackers through brute force attempts on weak password submissions.
Yes, physical access is necessary for an attacker to exploit the vulnerability associated with CVE-2009-4128.