what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2015-8370

Status Candidate

Overview

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

Related Files

Gentoo Linux Security Advisory 201512-03
Posted Dec 20, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201512-3 - GRUB's authentication prompt can be bypassed by entering a sequence of backspace characters. Versions less than 2.02_beta2-r8 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2015-8370
SHA-256 | 1ff5ad32f2a1c3039456b0a40b56a4be947afe02181fab6899febdaba1c2669c
Slackware Security Advisory - grub Updates
Posted Dec 18, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New grub packages are available for Slackware 14.1 and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-8370
SHA-256 | 83725abaa7311856eae58ea3aa43594cf6d9d290076e54a04c4289a9b9b15519
Debian Security Advisory 3421-1
Posted Dec 17, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3421-1 - Hector Marco and Ismael Ripoll, from Cybersecurity UPV Research Group, found an integer underflow vulnerability in Grub2, a popular bootloader. A local attacker can bypass the Grub2 authentication by inserting a crafted input as username or password.

tags | advisory, local
systems | linux, debian
advisories | CVE-2015-8370
SHA-256 | f4156217b5ae9a185551968893e74ac46477b0a78d1291d5790c57d0344da25d
Ubuntu Security Notice USN-2836-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2836-1 - Hector Marco and Ismael Ripoll discovered that GRUB incorrectly handled the backspace key when configured to use authentication. A local attacker could use this issue to bypass GRUB password protection.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-8370
SHA-256 | 050234264d83d3de1194c373fe3ddb557f00deab498633257f5fa170c8809fb8
Red Hat Security Advisory 2015-2623-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2623-01 - The grub2 packages provide version 2 of the Grand Unified Bootloader, a highly configurable and customizable bootloader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2015-8370
SHA-256 | 8e513ad962a5579515fa94feef5b7b79b914a236728e2e466f4e3b28975c6563
Grub2 Authentication Bypass
Posted Dec 15, 2015
Authored by Hector Marco, Ismael Ripoll

Grub2 versions 1.98 through 2.02 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2015-8370
SHA-256 | 83bd7487636061aa2b0800d6365ebfbe91d7c0307ab06febcf641741b08068f4
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close