First published: Wed Dec 16 2015(Updated: )
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
gnu Grub2 | =1.98 | |
gnu Grub2 | =1.99 | |
gnu Grub2 | =2.00 | |
gnu Grub2 | =2.01 | |
gnu Grub2 | =2.02 | |
Fedoraproject Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8370 is considered a high severity vulnerability due to its potential to bypass authentication and cause denial of service.
To fix CVE-2015-8370, upgrade Grub2 to version 2.02 or later, which includes patches that address this vulnerability.
CVE-2015-8370 may allow attackers to bypass authentication, access sensitive information, or cause disk corruption.
CVE-2015-8370 affects Grub2 versions 1.98 through 2.02, as well as Fedora version 23.
CVE-2015-8370 can be exploited by physically proximate attackers who have access to the system.