exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2015-8370

Status Candidate

Overview

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

Related Files

Gentoo Linux Security Advisory 201512-03
Posted Dec 20, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201512-3 - GRUB's authentication prompt can be bypassed by entering a sequence of backspace characters. Versions less than 2.02_beta2-r8 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2015-8370
SHA-256 | 1ff5ad32f2a1c3039456b0a40b56a4be947afe02181fab6899febdaba1c2669c
Slackware Security Advisory - grub Updates
Posted Dec 18, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New grub packages are available for Slackware 14.1 and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-8370
SHA-256 | 83725abaa7311856eae58ea3aa43594cf6d9d290076e54a04c4289a9b9b15519
Debian Security Advisory 3421-1
Posted Dec 17, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3421-1 - Hector Marco and Ismael Ripoll, from Cybersecurity UPV Research Group, found an integer underflow vulnerability in Grub2, a popular bootloader. A local attacker can bypass the Grub2 authentication by inserting a crafted input as username or password.

tags | advisory, local
systems | linux, debian
advisories | CVE-2015-8370
SHA-256 | f4156217b5ae9a185551968893e74ac46477b0a78d1291d5790c57d0344da25d
Ubuntu Security Notice USN-2836-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2836-1 - Hector Marco and Ismael Ripoll discovered that GRUB incorrectly handled the backspace key when configured to use authentication. A local attacker could use this issue to bypass GRUB password protection.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-8370
SHA-256 | 050234264d83d3de1194c373fe3ddb557f00deab498633257f5fa170c8809fb8
Red Hat Security Advisory 2015-2623-01
Posted Dec 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2623-01 - The grub2 packages provide version 2 of the Grand Unified Bootloader, a highly configurable and customizable bootloader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2015-8370
SHA-256 | 8e513ad962a5579515fa94feef5b7b79b914a236728e2e466f4e3b28975c6563
Grub2 Authentication Bypass
Posted Dec 15, 2015
Authored by Hector Marco, Ismael Ripoll

Grub2 versions 1.98 through 2.02 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2015-8370
SHA-256 | 83bd7487636061aa2b0800d6365ebfbe91d7c0307ab06febcf641741b08068f4
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close